SlideShare a Scribd company logo
1 of 43
Download to read offline
Mobile Security
A Glimpse from the Trenches
Yair Amit
CTO & Co-Founder
Skycure
@YairAmit
!  Today
!  CTO & co-founder of Skycure
!  Previously
!  Managed the Application Security Group at IBM
!  Joined IBM through the acquisition of Watchfire
!  Loves and lives security
!  Filed over 15 security patents
About&Me&
A&Holis-c&Outlook&on&Mobile&Security&
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Biggest'Threat
Changing'Threat
Emerging'Threat
Basic'Threat
Malware&
The$Physical$Layer$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
!  Threat&vector&
!  Device'lost'/'device'stolen'/'temporary'physical'access
!  Basic&physical&security&needs:&
!  Remote'wipe
!  Locate'device
!  Backup
!  Local'storage
!  Passcode'protec@on
!  The&above&becomes&OS&responsibility&
!  MDM&provides&the&above&OS&features&together&with&
management&and&policy&enforcement&
The&Physical&Layer&
Network$Based$A6acks$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
Based on Skycure enabled devices worldwide
Real World Incident Statistics&
Affected Devices Over Time
0%&
10%&
20%&
30%&
40%&
50%&
0%&
23%&
30%&
35%&
41%&
1&Month&
2&Months&
3&Months&
4&Months&
!&
&
!  Did&network&aNacks&happen&near&your&office?&
!  Are&airports&more&suscep-ble&to&aNacks?&
!  Which&networks&at&a&conference&should&I&be&avoiding?&
Global&RealUTime&Threat&Map&&
hNps://maps.skycure.com&
$
$
Implementa;on<Based$Vulnerabili;es$
$
Vs.$
$
Design<Based$Vulnerabili;es$
Network&Based&ANacks&
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
Network$Based$A6acks$
$
Implementa-on&issues$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
$iOS$vs.$Android$
Implementa-onUBased&Vulnerabili-es&
!  Example&I:&
&
gotofail&
Implementa-onUBased&Vulnerabili-es&
>>'Read'more
Gotofail&–&The&Code&
static OSStatus

SSLVerifySignedServerKeyExchange(SSLContext *ctx, bool isRsa, SSLBuffer signedParams,
uint8_t *signature, UInt16 signatureLen) {
…
if ((err = SSLHashSHA1.update(&hashCtx, &clientRandom)) != 0)
goto fail;
if ((err = SSLHashSHA1.update(&hashCtx, &serverRandom)) != 0)
goto fail;
if ((err = SSLHashSHA1.update(&hashCtx, &signedParams)) != 0)
goto fail;
goto fail;
if ((err = SSLHashSHA1.final(&hashCtx, &hashOut)) != 0)
goto fail;
err = sslRawVerify(ctx,
ctx->peerPubKey,
dataToSign, /* plaintext */
dataToSignLen, /* plaintext length */
signature,
signatureLen);
…
fail:
SSLFreeBuffer(&signedHashes);
SSLFreeBuffer(&hashCtx);
return err;
}&
Always&goto&
“fail”,&even&if&
err==0&
Code&is&skipped&
(even&though&err&==&0)&
Func-on&returns&0&(i.e.&verified),&
even&though&sslRawVerify&was&
not&called&
!  Example&II:&
&
Heartbleed&
Implementa-onUBased&Vulnerabili-es&
>>'Read'more
Heartbleed&
Network$Based$A6acks$
$
Design&issues$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
!  Design&issues&are&much&more&interes-ng&
!  …'and'much'harder'to'fix
!  These&are&divided&into&two&types:&
!  General'“protocol”'vulnerabili@es
!  Design'issues'affec@ng'mobile'OS
!  Mobile&devices&are&more&suscep-ble:&
!  Classical'solu@ons'are'inadequate
!  Excessive'use'of'untrusted'networks
DesignUBased&Vulnerabili-es&
!  Example&I:&
&
&
sslstrip&
DesignUBased&Vulnerabili-es&(Generic)&
ANacker&removes&redirec;ons$
and&links&to&HTTPS&
Vic-m&con-nues&to&interact&via&HTTP&
instead&of&HTTPs&
Server&returns&a&redirec-on&to&
HTTPS&
>>'Read'more
!  Example&II:&
SSL&decryp-on&
DesignUBased&Vulnerabili-es&(Generic)&
92%'of'users'click'on'“Con@nue”
compromising'their'Exchange'iden@ty'
'(username'and'password)
Con@nue
92%
Cancel
8%
!  Example&III:&
Karma&
DesignUBased&Vulnerabili-es&(Generic)&
Hak5’s'WiFi'Pineapple
>>'Read'more
Network$Based$A6acks$
$
MobileUspecific&
design&issues$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
iOS sandbox approach
Source: Apple’s App Sandbox Design Guide
App Characteristics
$
!  One&Store&
!  Heavy&Screening&
!  App&Sandboxing&
Profile Characteristics
!  No&Store&
!  No&Screening&
!  No&Sandboxing&
iOS Security Model&
Where$Do$We$Find$Them?$
!  Mobile&Device&Management&(MDM)&
!  Cellular&carriers&
!  Usually'used'for'APN'sengs
!  Mobile&applica-ons&
!  Service&providers&
Configura-on&Profiles&
Configura;on$profiles$can$also$be$malicious$
!  Malicious&“service&providers”&(apps/services/WiUFis/etc.)&
!  Vulnerable&services&
!  Privacy&viola-ng&services&
Malicious&Profiles&
Click to install
streaming profile
Welcome to iOS
Streamer
Watch TV shows and
movies free online.
Stream your favorite
content directly to
your iOS device.
Hacker'gains'access'to'your'mail,'business'
apps,'cloud'services,'bank'accounts'and'
more,'even if traffic is encrypted
>>'Read'more
Going$Viral$
!  ANacker&hijacks&vic-m’s&key&iden--es&
!  Corporate'Exchange
!  Facebook
!  LinkedIn
!  ANacker&sends&mass&messages&to&vic-m’s&contacts,&luring&
them&to&install&the&malicious&profile&
!  ANack&propagates&
Malicious&Profiles&
!  Profile&lis-ng&could&indicate&suspicious&profiles&
!  CatUandUmouse&game:&aNackers&can&name&their&profile&to&look&
benign&
&
Am&I&Safe?&
!  Example&II:&
WiFiGate&
DesignUBased&Vulnerabili-es&(Mobile)&
>>'Read'more
App$Level$Security$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
!  Mobile&OS&enforce&addi-onal&security&models&
!  Sandbox
!  Be_er'updates
!  Controlled'applica@on'stores
!  AppUlevel&issues&are&now&on&the&rise&
App&Level&Security&&&Privacy&
App$Vulnerabili;es$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
!  Example&I:&
Plain&HTTP&
App&Level&Vulnerabili-es&
Daaa!&
!  Example&II:&
&
Cer-ficate&Pinning&
App&Level&Vulnerabili-es&
>>'Read'more
A$Long$Way$to$Go$
!  Almost&all&major&apps&today&lack&SSL&Pinning&
!  Suscep@ble'to'a_acks'such'as'malicious'profiles'by'design
!  Also'exploited'when'a_acker'gains'access'to'a'trusted'CA
!  Slow&adop-on&should&not&come&as&a&surprise&
!  Implementa@on'challenges
!  Less'flexibility
!  Can'become'a'nightmare'if'done'wrong…
Cer-ficate&Pinning&
!  Example&III:&
&
HTTP&Request&&&Hijacking&
App&Level&Vulnerabili-es&
Vic@m'interacts'with'the'
malicious'server
A'while'later,
vic@m'opens'the'app
App'logic'has'
changed!
A_acker'returns'a'301'
direc@ve'specifying'a'
permanent'change'in'URI
Victim opens the app in an
untrusted environment
App'con@nues'to'connect'
to'the'malicious'server!
Malicious'server'can'
return'actual'results'
from'the'target'server
>>'Read'more
HRH&–&ANack&Flow&
Malicious$Apps$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
The year of
Android
malware [1]
Google reveals
“Bouncer” - its
malware
scanner [2]
Malware is
moving out of
the Google
Play [3]
Google adds full-time
app scanning to address
malware on external
stores [4]
Google’s&Focus&on&Malware&
Android is becoming like iOS
when it comes to malware
!  While&OS&an-Umalware&techniques&advance,&there&are&other&
similar&problems&(harder&to&address)&
The&Maliciousness&Axis&
Malicious'
Apps
Ad'
Networks
Privacy'
Viola@ons
Not&an&Android&Only&Issue…&
Summary$
!  The&physical&threats&
!  Becomes'the'OS'responsibility
!  Network&based&threats&
!  Implementa@on'vulnerabili@es
!  Design'vulnerabili@es
!  Generic'vs.'mobile'specific
!  App&level&threats&
!  Vulnerabili@es
!  HTTP/S,'Cer@ficate'Pinning,'HTTP'Request'Hijacking
!  The'“maliciousness”'axis
!  Malware'!'Ad'Networks'!'Privacy'Viola@ons
Summary&
!  Personal level
!  Maintain'an'up'to'date'opera@nglsystem
!  Update'the'apps'that'you'are'using
!  Be'alerted'and'aware'of'evolving'threats
!  Network'layer
!  Thirdlparty'app'stores
!  OS'misconfigura@ons'and'vulnerabili@es
!  Organizational level&
!  Deploy'a'mobile'security'solu@on
Recommenda-ons&
Thank you!
!  Twi_er: 
@YairAmit
!  Email: 
yair@skycure.com
!  Blog: 
h_p://www.skycure.com/blog
Seamless Mobile Security

More Related Content

What's hot

Digital Dating Safety
Digital Dating SafetyDigital Dating Safety
Digital Dating SafetyIBM Security
 
iOS and Android security: Differences you need to know
iOS and Android security: Differences you need to knowiOS and Android security: Differences you need to know
iOS and Android security: Differences you need to knowNowSecure
 
Auth on the web: better authentication
Auth on the web: better authenticationAuth on the web: better authentication
Auth on the web: better authenticationKelley Robinson
 
Illumina Customer Presentation
Illumina Customer PresentationIllumina Customer Presentation
Illumina Customer PresentationSplunk
 
Mindspark 21' - Sparrow platform
Mindspark 21' - Sparrow platform Mindspark 21' - Sparrow platform
Mindspark 21' - Sparrow platform Jay Lohokare
 
Designing customer account recovery in a 2FA world
Designing customer account recovery in a 2FA worldDesigning customer account recovery in a 2FA world
Designing customer account recovery in a 2FA worldKelley Robinson
 

What's hot (6)

Digital Dating Safety
Digital Dating SafetyDigital Dating Safety
Digital Dating Safety
 
iOS and Android security: Differences you need to know
iOS and Android security: Differences you need to knowiOS and Android security: Differences you need to know
iOS and Android security: Differences you need to know
 
Auth on the web: better authentication
Auth on the web: better authenticationAuth on the web: better authentication
Auth on the web: better authentication
 
Illumina Customer Presentation
Illumina Customer PresentationIllumina Customer Presentation
Illumina Customer Presentation
 
Mindspark 21' - Sparrow platform
Mindspark 21' - Sparrow platform Mindspark 21' - Sparrow platform
Mindspark 21' - Sparrow platform
 
Designing customer account recovery in a 2FA world
Designing customer account recovery in a 2FA worldDesigning customer account recovery in a 2FA world
Designing customer account recovery in a 2FA world
 

Viewers also liked

iOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious ProfilesiOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious ProfilesYair Amit
 
SlideShare for OzonAction
SlideShare for OzonActionSlideShare for OzonAction
SlideShare for OzonActionAmit Ranjan
 
Holi Riots at the SlideShare Delhi office
Holi Riots at the SlideShare Delhi officeHoli Riots at the SlideShare Delhi office
Holi Riots at the SlideShare Delhi officeAmit Ranjan
 
The Story of Pocahontas
The Story of PocahontasThe Story of Pocahontas
The Story of PocahontasChuck Thompson
 
YouTube Tools to the Rescue - Area 10-11 Conference
YouTube Tools to the Rescue - Area 10-11 ConferenceYouTube Tools to the Rescue - Area 10-11 Conference
YouTube Tools to the Rescue - Area 10-11 ConferenceDiana Benner
 
YouTube Tools To The Rescue - Tots & Technology 2015
YouTube Tools To The Rescue - Tots & Technology 2015YouTube Tools To The Rescue - Tots & Technology 2015
YouTube Tools To The Rescue - Tots & Technology 2015Diana Benner
 
LinkedIn acquires SlideShare
LinkedIn acquires SlideShareLinkedIn acquires SlideShare
LinkedIn acquires SlideShareAmit Ranjan
 
Knowledge Management Summit 2008 Snaps
Knowledge Management Summit 2008 SnapsKnowledge Management Summit 2008 Snaps
Knowledge Management Summit 2008 SnapsAmit Ranjan
 
Skynet project: Monitor, analyze, scale, and maintain a system in the Cloud
Skynet project: Monitor, analyze, scale, and maintain a system in the CloudSkynet project: Monitor, analyze, scale, and maintain a system in the Cloud
Skynet project: Monitor, analyze, scale, and maintain a system in the CloudSylvain Kalache
 
Scaling SlideShare to the World - An Asian Perpective
Scaling SlideShare to the World - An Asian PerpectiveScaling SlideShare to the World - An Asian Perpective
Scaling SlideShare to the World - An Asian PerpectiveAmit Ranjan
 
The Story of Pocahontas and Captain John Smith
The Story of Pocahontas and Captain John SmithThe Story of Pocahontas and Captain John Smith
The Story of Pocahontas and Captain John SmithChuck Thompson
 
Company culture difference between France & USA
Company culture difference between France & USACompany culture difference between France & USA
Company culture difference between France & USASylvain Kalache
 
SlideShare makes an acquisition... guess what?
SlideShare makes an acquisition... guess what?SlideShare makes an acquisition... guess what?
SlideShare makes an acquisition... guess what?Amit Ranjan
 
while42 the untold story
while42 the untold storywhile42 the untold story
while42 the untold storySylvain Kalache
 
We got SlideShare on our Walls!
We got SlideShare on our Walls!We got SlideShare on our Walls!
We got SlideShare on our Walls!Amit Ranjan
 
Knowing Me Knowing YouTube
Knowing Me Knowing YouTubeKnowing Me Knowing YouTube
Knowing Me Knowing YouTubeAdrian Stevenson
 
Copyright and illegal downloading CULT3020
Copyright and illegal downloading CULT3020Copyright and illegal downloading CULT3020
Copyright and illegal downloading CULT3020StaceyReibelt
 
Startup Metrics for Pirates: AARRR! (SXSW March 2008)
Startup Metrics for Pirates: AARRR!  (SXSW March 2008)Startup Metrics for Pirates: AARRR!  (SXSW March 2008)
Startup Metrics for Pirates: AARRR! (SXSW March 2008)Dave McClure
 

Viewers also liked (20)

iOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious ProfilesiOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious Profiles
 
SlideShare for OzonAction
SlideShare for OzonActionSlideShare for OzonAction
SlideShare for OzonAction
 
Holi Riots at the SlideShare Delhi office
Holi Riots at the SlideShare Delhi officeHoli Riots at the SlideShare Delhi office
Holi Riots at the SlideShare Delhi office
 
The Story of Pocahontas
The Story of PocahontasThe Story of Pocahontas
The Story of Pocahontas
 
BarCamp Delhi 5
BarCamp Delhi 5BarCamp Delhi 5
BarCamp Delhi 5
 
YouTube Tools to the Rescue - Area 10-11 Conference
YouTube Tools to the Rescue - Area 10-11 ConferenceYouTube Tools to the Rescue - Area 10-11 Conference
YouTube Tools to the Rescue - Area 10-11 Conference
 
YouTube Tools To The Rescue - Tots & Technology 2015
YouTube Tools To The Rescue - Tots & Technology 2015YouTube Tools To The Rescue - Tots & Technology 2015
YouTube Tools To The Rescue - Tots & Technology 2015
 
LinkedIn acquires SlideShare
LinkedIn acquires SlideShareLinkedIn acquires SlideShare
LinkedIn acquires SlideShare
 
Knowledge Management Summit 2008 Snaps
Knowledge Management Summit 2008 SnapsKnowledge Management Summit 2008 Snaps
Knowledge Management Summit 2008 Snaps
 
Skynet project: Monitor, analyze, scale, and maintain a system in the Cloud
Skynet project: Monitor, analyze, scale, and maintain a system in the CloudSkynet project: Monitor, analyze, scale, and maintain a system in the Cloud
Skynet project: Monitor, analyze, scale, and maintain a system in the Cloud
 
Scaling SlideShare to the World - An Asian Perpective
Scaling SlideShare to the World - An Asian PerpectiveScaling SlideShare to the World - An Asian Perpective
Scaling SlideShare to the World - An Asian Perpective
 
The Story of Pocahontas and Captain John Smith
The Story of Pocahontas and Captain John SmithThe Story of Pocahontas and Captain John Smith
The Story of Pocahontas and Captain John Smith
 
Company culture difference between France & USA
Company culture difference between France & USACompany culture difference between France & USA
Company culture difference between France & USA
 
SlideShare makes an acquisition... guess what?
SlideShare makes an acquisition... guess what?SlideShare makes an acquisition... guess what?
SlideShare makes an acquisition... guess what?
 
while42 the untold story
while42 the untold storywhile42 the untold story
while42 the untold story
 
We got SlideShare on our Walls!
We got SlideShare on our Walls!We got SlideShare on our Walls!
We got SlideShare on our Walls!
 
Knowing Me Knowing YouTube
Knowing Me Knowing YouTubeKnowing Me Knowing YouTube
Knowing Me Knowing YouTube
 
Copyright and illegal downloading CULT3020
Copyright and illegal downloading CULT3020Copyright and illegal downloading CULT3020
Copyright and illegal downloading CULT3020
 
SlideShare culture
SlideShare cultureSlideShare culture
SlideShare culture
 
Startup Metrics for Pirates: AARRR! (SXSW March 2008)
Startup Metrics for Pirates: AARRR!  (SXSW March 2008)Startup Metrics for Pirates: AARRR!  (SXSW March 2008)
Startup Metrics for Pirates: AARRR! (SXSW March 2008)
 

Similar to Mobile Security: A Glimpse from the Trenches

i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...ProductNation/iSPIRT
 
Debunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSecDebunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSecNowSecure
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldApperian
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile SecurityAVG Technologies AU
 
Security Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSecurity Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSalesforce Developers
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldEmil Tan
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Advanced monitoring
 
Building a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing BlueprintBuilding a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing BlueprintNowSecure
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Amazon Web Services
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?Zscaler
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?Tyler Shields
 
DEF CON 23 - Sam Bowne - workshop android security auditing mobile apps
DEF CON 23 - Sam Bowne - workshop android security auditing mobile appsDEF CON 23 - Sam Bowne - workshop android security auditing mobile apps
DEF CON 23 - Sam Bowne - workshop android security auditing mobile appsFelipe Prado
 
i7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7Networks
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Advanced monitoring
 
UKLUG 2011 - iOS devices in the enterprise
UKLUG 2011 - iOS devices in the enterpriseUKLUG 2011 - iOS devices in the enterprise
UKLUG 2011 - iOS devices in the enterpriseRené Winkelmeyer
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application SecurityMarie Weaver
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference ArchitectureFrom Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference ArchitectureNowSecure
 

Similar to Mobile Security: A Glimpse from the Trenches (20)

Cloud controls final2
Cloud controls final2Cloud controls final2
Cloud controls final2
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
 
Debunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSecDebunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSec
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
Security Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSecurity Best Practices for Mobile Development
Security Best Practices for Mobile Development
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 
Building a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing BlueprintBuilding a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing Blueprint
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
DEF CON 23 - Sam Bowne - workshop android security auditing mobile apps
DEF CON 23 - Sam Bowne - workshop android security auditing mobile appsDEF CON 23 - Sam Bowne - workshop android security auditing mobile apps
DEF CON 23 - Sam Bowne - workshop android security auditing mobile apps
 
i7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprises
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
 
UKLUG 2011 - iOS devices in the enterprise
UKLUG 2011 - iOS devices in the enterpriseUKLUG 2011 - iOS devices in the enterprise
UKLUG 2011 - iOS devices in the enterprise
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference ArchitectureFrom Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
 

Mobile Security: A Glimpse from the Trenches