Bitedefender Andorid/Mobile Security will Keep your Mobile device secured as well as your Mobile data & Privacy. #MobileSecurity
https://www.bitdefender.com.bd
\
C0c0n 2011 mobile security presentation v1.2Santosh Satam
Mobile phone security has been a hot topic for debate in recent times. The top mobile manufacturers seem to claim that their mobiles and applications are secure, but recent news on mobile hacking and malware suggest otherwise.
One of the key challenges in mobile security is the diverse platforms and multitude of operating systems (both open and proprietary) in the market. This makes it almost impossible to devise a generic catch-all strategy for mobile application security. Every platform whether it is iOS, Android, Blackberry, Windows Mobile, Symbian etc. is unique and requires a specialized treatment.
In this talk, we will demystify mobile and related application security. We will understand the architectures of various mobile operating systems and the native security support provided by the manufacturers and operating system vendors. Then we will look at how hackers have come up with different techniques and tools to break mobile security, and what mobile companies are doing to mitigate these attacks.
Finally, we will look at secure practices for mobile deployment in the Enterprise using policy files and other technology solutions, We will also outline best practices for business users and road warriors, on how to ensure your company data is protected while still continuing to enjoy the flexibility provided by mobile phones.
cell phone is the basic requirement for any type of communication over the world so you r supposed to know the minimum basic information of your cell phone, viruses & its security.
Bitedefender Andorid/Mobile Security will Keep your Mobile device secured as well as your Mobile data & Privacy. #MobileSecurity
https://www.bitdefender.com.bd
\
C0c0n 2011 mobile security presentation v1.2Santosh Satam
Mobile phone security has been a hot topic for debate in recent times. The top mobile manufacturers seem to claim that their mobiles and applications are secure, but recent news on mobile hacking and malware suggest otherwise.
One of the key challenges in mobile security is the diverse platforms and multitude of operating systems (both open and proprietary) in the market. This makes it almost impossible to devise a generic catch-all strategy for mobile application security. Every platform whether it is iOS, Android, Blackberry, Windows Mobile, Symbian etc. is unique and requires a specialized treatment.
In this talk, we will demystify mobile and related application security. We will understand the architectures of various mobile operating systems and the native security support provided by the manufacturers and operating system vendors. Then we will look at how hackers have come up with different techniques and tools to break mobile security, and what mobile companies are doing to mitigate these attacks.
Finally, we will look at secure practices for mobile deployment in the Enterprise using policy files and other technology solutions, We will also outline best practices for business users and road warriors, on how to ensure your company data is protected while still continuing to enjoy the flexibility provided by mobile phones.
cell phone is the basic requirement for any type of communication over the world so you r supposed to know the minimum basic information of your cell phone, viruses & its security.
Introduction to ICT supply chain (Cyber norms awareness) Benjamin Ang
This presentation illustrates ICT software and hardware suppy chains, for better understanding of the UNGGE 2015 Cyber norm: States should take steps to ensure supply chain security, and should seek to prevent the proliferation of malicious ICT and the use of harmful hidden functions.
The above PPT contains the following content:
1. SPREADING OF VIRUS
2. ANAMNESIS (CASE STUDIES)
3. CURRENT STATUS OF MOBILE MALWARE
4. PROTECTIVE MEASURES
5. THREATS OF MOBILE PHONE
6. CONCLUSION
The detailed PROTECTIVE MEASURES are given in the above PPT.
The main agenda of this work is to design advanced security with affordable and less complex system referred as “Invisible Eyeâ€. In this modern era, property crimes are more predominant which necessitates developing an advanced security system. In order to overcome predominant and contagious crimes the researchers used the technology in a more efficient way to prevent the theft. This method uses sensors, cameras and AI systems to detect, capture and send information respectively to the cops. Ms. R. Selvapriya | Raghul. D "The Invisible Eye" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21627.pdf
This presentation gives an overview of various security issues in mobile phones having different operating systems. Ways to avoid spamming and malware in our mobile phones are also presented.
Intense overview of most mobile security related issues
From Clust Education talk on Security Summit in Milan (Italy):
https://www.securitysummit.it/eventi/view/82
Security challenges of smart phone & mobile device
Visualizing mobile security
Attacks moving to mobile – why?
What your phone knows & what it shares
Smart phone & mobile device the threats
Countermeasures
Mobile security best practices
Smartphone Ownage: The state of mobile botnets and rootkitsJimmy Shah
Symbian Botnet? Mobile Linux Rootkits? iPhone Botnets? Millions of phones at risk? The press coverage on smart phone threats is at times somewhat accurate, distant, and occasionally (if unintentionally) misleading. They tend to raise questions such as: How close to PC levels (100,000+ to millions of nodes) have mobile botnets reached? Have mobile rootkits reached the complexity of those on the PC?
This talk covered the state of rootkits and botnets on smart phones from the perspective of anti-malware researchers, including demystification of the threat from mobile rootkits and mobile botnets, the differences (if any) between mobile rootkits and mobile botnets vs. their PC counterparts, and a look at how samples seen in the wild and researcher PoCs function.
Introduction to ICT supply chain (Cyber norms awareness) Benjamin Ang
This presentation illustrates ICT software and hardware suppy chains, for better understanding of the UNGGE 2015 Cyber norm: States should take steps to ensure supply chain security, and should seek to prevent the proliferation of malicious ICT and the use of harmful hidden functions.
The above PPT contains the following content:
1. SPREADING OF VIRUS
2. ANAMNESIS (CASE STUDIES)
3. CURRENT STATUS OF MOBILE MALWARE
4. PROTECTIVE MEASURES
5. THREATS OF MOBILE PHONE
6. CONCLUSION
The detailed PROTECTIVE MEASURES are given in the above PPT.
The main agenda of this work is to design advanced security with affordable and less complex system referred as “Invisible Eyeâ€. In this modern era, property crimes are more predominant which necessitates developing an advanced security system. In order to overcome predominant and contagious crimes the researchers used the technology in a more efficient way to prevent the theft. This method uses sensors, cameras and AI systems to detect, capture and send information respectively to the cops. Ms. R. Selvapriya | Raghul. D "The Invisible Eye" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21627.pdf
This presentation gives an overview of various security issues in mobile phones having different operating systems. Ways to avoid spamming and malware in our mobile phones are also presented.
Intense overview of most mobile security related issues
From Clust Education talk on Security Summit in Milan (Italy):
https://www.securitysummit.it/eventi/view/82
Security challenges of smart phone & mobile device
Visualizing mobile security
Attacks moving to mobile – why?
What your phone knows & what it shares
Smart phone & mobile device the threats
Countermeasures
Mobile security best practices
Smartphone Ownage: The state of mobile botnets and rootkitsJimmy Shah
Symbian Botnet? Mobile Linux Rootkits? iPhone Botnets? Millions of phones at risk? The press coverage on smart phone threats is at times somewhat accurate, distant, and occasionally (if unintentionally) misleading. They tend to raise questions such as: How close to PC levels (100,000+ to millions of nodes) have mobile botnets reached? Have mobile rootkits reached the complexity of those on the PC?
This talk covered the state of rootkits and botnets on smart phones from the perspective of anti-malware researchers, including demystification of the threat from mobile rootkits and mobile botnets, the differences (if any) between mobile rootkits and mobile botnets vs. their PC counterparts, and a look at how samples seen in the wild and researcher PoCs function.
26. 27
Three key takeaway points
1. Use mobile security software
2. Segregate your network BYOD zone and
Corporate zone
3. Use mobile security software
27. Hacking Android – How a BYOD
device can take down your entire network
@infosecBoddy
Matt Boddy
Editor's Notes
Introduction to me
Show of hands, how many of you don’t have a mobile phone on you right now?
How many of your colleagues and staff at your business take their phones with them WHEREVER they go?
Story of my mum
Proof that you can ping out of a network, but not into one when SNAT is enabled
Surprisingly this has kept organisations safe for years