Be the first to like this
In this engaging session, we demonstrate a live attack technique aimed at bypassing a popular MDM solution with an email encryption offering. Further, we show how the mobile surveillance software effectively renders the encryption feature useless. This demonstration includes a mobile spyware version which directly accesses the MDM’s memory storage, retrieves the plain-text emails and sends them on to a remote server. Finally, we present mitigation techniques to solve against this problem.
Differentiate between mass consumer-oriented mobile attacks and targeted mobile cyber-attacks
Recognise the shortcoming of MDM as a wholesome security solution
Enhance mobile attack mitigation techniques through mobile activity visibility