SlideShare a Scribd company logo
Mobile Security
A Glimpse from the Trenches
Yair Amit
CTO & Co-Founder
Skycure
@YairAmit
!  Today
!  CTO & co-founder of Skycure
!  Previously
!  Managed the Application Security Group at IBM
!  Joined IBM through the acquisition of Watchfire
!  Loves and lives security
!  Filed over 15 security patents
About&Me&
A&Holis-c&Outlook&on&Mobile&Security&
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Biggest'Threat
Changing'Threat
Emerging'Threat
Basic'Threat
Malware&
The$Physical$Layer$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
!  Threat&vector&
!  Device'lost'/'device'stolen'/'temporary'physical'access
!  Basic&physical&security&needs:&
!  Remote'wipe
!  Locate'device
!  Backup
!  Local'storage
!  Passcode'protec@on
!  The&above&becomes&OS&responsibility&
!  MDM&provides&the&above&OS&features&together&with&
management&and&policy&enforcement&
The&Physical&Layer&
Network$Based$A6acks$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
Based on Skycure enabled devices worldwide
Real World Incident Statistics&
Affected Devices Over Time
0%&
10%&
20%&
30%&
40%&
50%&
0%&
23%&
30%&
35%&
41%&
1&Month&
2&Months&
3&Months&
4&Months&
!&
&
!  Did&network&aNacks&happen&near&your&office?&
!  Are&airports&more&suscep-ble&to&aNacks?&
!  Which&networks&at&a&conference&should&I&be&avoiding?&
Global&RealUTime&Threat&Map&&
hNps://maps.skycure.com&
$
$
Implementa;on<Based$Vulnerabili;es$
$
Vs.$
$
Design<Based$Vulnerabili;es$
Network&Based&ANacks&
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
Network$Based$A6acks$
$
Implementa-on&issues$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
$iOS$vs.$Android$
Implementa-onUBased&Vulnerabili-es&
!  Example&I:&
&
gotofail&
Implementa-onUBased&Vulnerabili-es&
>>'Read'more
Gotofail&–&The&Code&
static OSStatus

SSLVerifySignedServerKeyExchange(SSLContext *ctx, bool isRsa, SSLBuffer signedParams,
uint8_t *signature, UInt16 signatureLen) {
…
if ((err = SSLHashSHA1.update(&hashCtx, &clientRandom)) != 0)
goto fail;
if ((err = SSLHashSHA1.update(&hashCtx, &serverRandom)) != 0)
goto fail;
if ((err = SSLHashSHA1.update(&hashCtx, &signedParams)) != 0)
goto fail;
goto fail;
if ((err = SSLHashSHA1.final(&hashCtx, &hashOut)) != 0)
goto fail;
err = sslRawVerify(ctx,
ctx->peerPubKey,
dataToSign, /* plaintext */
dataToSignLen, /* plaintext length */
signature,
signatureLen);
…
fail:
SSLFreeBuffer(&signedHashes);
SSLFreeBuffer(&hashCtx);
return err;
}&
Always&goto&
“fail”,&even&if&
err==0&
Code&is&skipped&
(even&though&err&==&0)&
Func-on&returns&0&(i.e.&verified),&
even&though&sslRawVerify&was&
not&called&
!  Example&II:&
&
Heartbleed&
Implementa-onUBased&Vulnerabili-es&
>>'Read'more
Heartbleed&
Network$Based$A6acks$
$
Design&issues$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
!  Design&issues&are&much&more&interes-ng&
!  …'and'much'harder'to'fix
!  These&are&divided&into&two&types:&
!  General'“protocol”'vulnerabili@es
!  Design'issues'affec@ng'mobile'OS
!  Mobile&devices&are&more&suscep-ble:&
!  Classical'solu@ons'are'inadequate
!  Excessive'use'of'untrusted'networks
DesignUBased&Vulnerabili-es&
!  Example&I:&
&
&
sslstrip&
DesignUBased&Vulnerabili-es&(Generic)&
ANacker&removes&redirec;ons$
and&links&to&HTTPS&
Vic-m&con-nues&to&interact&via&HTTP&
instead&of&HTTPs&
Server&returns&a&redirec-on&to&
HTTPS&
>>'Read'more
!  Example&II:&
SSL&decryp-on&
DesignUBased&Vulnerabili-es&(Generic)&
92%'of'users'click'on'“Con@nue”
compromising'their'Exchange'iden@ty'
'(username'and'password)
Con@nue
92%
Cancel
8%
!  Example&III:&
Karma&
DesignUBased&Vulnerabili-es&(Generic)&
Hak5’s'WiFi'Pineapple
>>'Read'more
Network$Based$A6acks$
$
MobileUspecific&
design&issues$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
iOS sandbox approach
Source: Apple’s App Sandbox Design Guide
App Characteristics
$
!  One&Store&
!  Heavy&Screening&
!  App&Sandboxing&
Profile Characteristics
!  No&Store&
!  No&Screening&
!  No&Sandboxing&
iOS Security Model&
Where$Do$We$Find$Them?$
!  Mobile&Device&Management&(MDM)&
!  Cellular&carriers&
!  Usually'used'for'APN'sengs
!  Mobile&applica-ons&
!  Service&providers&
Configura-on&Profiles&
Configura;on$profiles$can$also$be$malicious$
!  Malicious&“service&providers”&(apps/services/WiUFis/etc.)&
!  Vulnerable&services&
!  Privacy&viola-ng&services&
Malicious&Profiles&
Click to install
streaming profile
Welcome to iOS
Streamer
Watch TV shows and
movies free online.
Stream your favorite
content directly to
your iOS device.
Hacker'gains'access'to'your'mail,'business'
apps,'cloud'services,'bank'accounts'and'
more,'even if traffic is encrypted
>>'Read'more
Going$Viral$
!  ANacker&hijacks&vic-m’s&key&iden--es&
!  Corporate'Exchange
!  Facebook
!  LinkedIn
!  ANacker&sends&mass&messages&to&vic-m’s&contacts,&luring&
them&to&install&the&malicious&profile&
!  ANack&propagates&
Malicious&Profiles&
!  Profile&lis-ng&could&indicate&suspicious&profiles&
!  CatUandUmouse&game:&aNackers&can&name&their&profile&to&look&
benign&
&
Am&I&Safe?&
!  Example&II:&
WiFiGate&
DesignUBased&Vulnerabili-es&(Mobile)&
>>'Read'more
App$Level$Security$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
!  Mobile&OS&enforce&addi-onal&security&models&
!  Sandbox
!  Be_er'updates
!  Controlled'applica@on'stores
!  AppUlevel&issues&are&now&on&the&rise&
App&Level&Security&&&Privacy&
App$Vulnerabili;es$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
!  Example&I:&
Plain&HTTP&
App&Level&Vulnerabili-es&
Daaa!&
!  Example&II:&
&
Cer-ficate&Pinning&
App&Level&Vulnerabili-es&
>>'Read'more
A$Long$Way$to$Go$
!  Almost&all&major&apps&today&lack&SSL&Pinning&
!  Suscep@ble'to'a_acks'such'as'malicious'profiles'by'design
!  Also'exploited'when'a_acker'gains'access'to'a'trusted'CA
!  Slow&adop-on&should&not&come&as&a&surprise&
!  Implementa@on'challenges
!  Less'flexibility
!  Can'become'a'nightmare'if'done'wrong…
Cer-ficate&Pinning&
!  Example&III:&
&
HTTP&Request&&&Hijacking&
App&Level&Vulnerabili-es&
Vic@m'interacts'with'the'
malicious'server
A'while'later,
vic@m'opens'the'app
App'logic'has'
changed!
A_acker'returns'a'301'
direc@ve'specifying'a'
permanent'change'in'URI
Victim opens the app in an
untrusted environment
App'con@nues'to'connect'
to'the'malicious'server!
Malicious'server'can'
return'actual'results'
from'the'target'server
>>'Read'more
HRH&–&ANack&Flow&
Malicious$Apps$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
The year of
Android
malware [1]
Google reveals
“Bouncer” - its
malware
scanner [2]
Malware is
moving out of
the Google
Play [3]
Google adds full-time
app scanning to address
malware on external
stores [4]
Google’s&Focus&on&Malware&
Android is becoming like iOS
when it comes to malware
!  While&OS&an-Umalware&techniques&advance,&there&are&other&
similar&problems&(harder&to&address)&
The&Maliciousness&Axis&
Malicious'
Apps
Ad'
Networks
Privacy'
Viola@ons
Not&an&Android&Only&Issue…&
Summary$
!  The&physical&threats&
!  Becomes'the'OS'responsibility
!  Network&based&threats&
!  Implementa@on'vulnerabili@es
!  Design'vulnerabili@es
!  Generic'vs.'mobile'specific
!  App&level&threats&
!  Vulnerabili@es
!  HTTP/S,'Cer@ficate'Pinning,'HTTP'Request'Hijacking
!  The'“maliciousness”'axis
!  Malware'!'Ad'Networks'!'Privacy'Viola@ons
Summary&
!  Personal level
!  Maintain'an'up'to'date'opera@nglsystem
!  Update'the'apps'that'you'are'using
!  Be'alerted'and'aware'of'evolving'threats
!  Network'layer
!  Thirdlparty'app'stores
!  OS'misconfigura@ons'and'vulnerabili@es
!  Organizational level&
!  Deploy'a'mobile'security'solu@on
Recommenda-ons&
Thank you!
!  Twi_er: 
@YairAmit
!  Email: 
yair@skycure.com
!  Blog: 
h_p://www.skycure.com/blog
Seamless Mobile Security

More Related Content

What's hot

IoT Broker
IoT BrokerIoT Broker
IoT BrokerFIWARE
 
Trends in Cloud and Mobile Computing - Alain Azagury, IBM
Trends in Cloud and Mobile Computing - Alain Azagury, IBMTrends in Cloud and Mobile Computing - Alain Azagury, IBM
Trends in Cloud and Mobile Computing - Alain Azagury, IBMCodemotion Tel Aviv
 
IoT and Alexa in the connected home
IoT and Alexa in the connected homeIoT and Alexa in the connected home
IoT and Alexa in the connected homeAmazon Web Services
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT PatternsWSO2
 
Industrial IoT, Machine Learning, and Innovation in the AWS Cloud
Industrial IoT, Machine Learning, and Innovation in the AWS CloudIndustrial IoT, Machine Learning, and Innovation in the AWS Cloud
Industrial IoT, Machine Learning, and Innovation in the AWS CloudAmazon Web Services
 
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)Amazon Web Services
 
Jamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS SecurityJamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS Securitycentralohioissa
 
Migrate legacy applications to AWS at scale with no code changes (Sponsored b...
Migrate legacy applications to AWS at scale with no code changes (Sponsored b...Migrate legacy applications to AWS at scale with no code changes (Sponsored b...
Migrate legacy applications to AWS at scale with no code changes (Sponsored b...Amazon Web Services
 
Internet of Things and Azure - DevTeach 2016
Internet of Things and Azure - DevTeach 2016Internet of Things and Azure - DevTeach 2016
Internet of Things and Azure - DevTeach 2016Guy Barrette
 
Internet of Things: Patterns For Building Real World Applications
Internet of Things: Patterns For Building Real World ApplicationsInternet of Things: Patterns For Building Real World Applications
Internet of Things: Patterns For Building Real World ApplicationsIvan Dwyer
 
Connecting IoT devices to Azure
Connecting IoT devices to AzureConnecting IoT devices to Azure
Connecting IoT devices to AzureGuy Barrette
 
Adopting Modern Application Architecture with AWS and Project Flogo (Sponsore...
Adopting Modern Application Architecture with AWS and Project Flogo (Sponsore...Adopting Modern Application Architecture with AWS and Project Flogo (Sponsore...
Adopting Modern Application Architecture with AWS and Project Flogo (Sponsore...Amazon Web Services
 
Using an Open Source RESTful Backend for IoT Applications
Using an Open Source RESTful Backend for IoT ApplicationsUsing an Open Source RESTful Backend for IoT Applications
Using an Open Source RESTful Backend for IoT ApplicationsJan Liband
 
Architecting IoT solutions with Microsoft Azure
Architecting IoT solutions with Microsoft AzureArchitecting IoT solutions with Microsoft Azure
Architecting IoT solutions with Microsoft AzureAlon Fliess
 
Building IoT solutions using Windows 10 IoT Core & Azure
Building IoT solutions using Windows 10 IoT Core & AzureBuilding IoT solutions using Windows 10 IoT Core & Azure
Building IoT solutions using Windows 10 IoT Core & AzureMostafa
 

What's hot (20)

Getting Started with IoT on AWS
Getting Started with IoT on AWSGetting Started with IoT on AWS
Getting Started with IoT on AWS
 
IoT Broker
IoT BrokerIoT Broker
IoT Broker
 
Trends in Cloud and Mobile Computing - Alain Azagury, IBM
Trends in Cloud and Mobile Computing - Alain Azagury, IBMTrends in Cloud and Mobile Computing - Alain Azagury, IBM
Trends in Cloud and Mobile Computing - Alain Azagury, IBM
 
Getting Started with AWS IoT
Getting Started with AWS IoTGetting Started with AWS IoT
Getting Started with AWS IoT
 
IoT and Alexa in the connected home
IoT and Alexa in the connected homeIoT and Alexa in the connected home
IoT and Alexa in the connected home
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
 
Industrial IoT, Machine Learning, and Innovation in the AWS Cloud
Industrial IoT, Machine Learning, and Innovation in the AWS CloudIndustrial IoT, Machine Learning, and Innovation in the AWS Cloud
Industrial IoT, Machine Learning, and Innovation in the AWS Cloud
 
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
 
Jamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS SecurityJamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS Security
 
Migrate legacy applications to AWS at scale with no code changes (Sponsored b...
Migrate legacy applications to AWS at scale with no code changes (Sponsored b...Migrate legacy applications to AWS at scale with no code changes (Sponsored b...
Migrate legacy applications to AWS at scale with no code changes (Sponsored b...
 
Internet of Things and Azure - DevTeach 2016
Internet of Things and Azure - DevTeach 2016Internet of Things and Azure - DevTeach 2016
Internet of Things and Azure - DevTeach 2016
 
Internet of Things: Patterns For Building Real World Applications
Internet of Things: Patterns For Building Real World ApplicationsInternet of Things: Patterns For Building Real World Applications
Internet of Things: Patterns For Building Real World Applications
 
Connecting IoT devices to Azure
Connecting IoT devices to AzureConnecting IoT devices to Azure
Connecting IoT devices to Azure
 
Adopting Modern Application Architecture with AWS and Project Flogo (Sponsore...
Adopting Modern Application Architecture with AWS and Project Flogo (Sponsore...Adopting Modern Application Architecture with AWS and Project Flogo (Sponsore...
Adopting Modern Application Architecture with AWS and Project Flogo (Sponsore...
 
Azure IoT Hub
Azure IoT HubAzure IoT Hub
Azure IoT Hub
 
AWS IoT Lab Introduction
AWS IoT Lab IntroductionAWS IoT Lab Introduction
AWS IoT Lab Introduction
 
Using an Open Source RESTful Backend for IoT Applications
Using an Open Source RESTful Backend for IoT ApplicationsUsing an Open Source RESTful Backend for IoT Applications
Using an Open Source RESTful Backend for IoT Applications
 
AWS_AIoT_Blockchain_in_IoT
AWS_AIoT_Blockchain_in_IoTAWS_AIoT_Blockchain_in_IoT
AWS_AIoT_Blockchain_in_IoT
 
Architecting IoT solutions with Microsoft Azure
Architecting IoT solutions with Microsoft AzureArchitecting IoT solutions with Microsoft Azure
Architecting IoT solutions with Microsoft Azure
 
Building IoT solutions using Windows 10 IoT Core & Azure
Building IoT solutions using Windows 10 IoT Core & AzureBuilding IoT solutions using Windows 10 IoT Core & Azure
Building IoT solutions using Windows 10 IoT Core & Azure
 

Viewers also liked

українська література
українська літератураукраїнська література
українська літератураInnaPashchenko
 
mortgage and outreach resume
mortgage and outreach resumemortgage and outreach resume
mortgage and outreach resumeKristy Barbier
 
Pushing JavaEE outside of the enterprise: Home Automation & IoT - David Delab...
Pushing JavaEE outside of the enterprise: Home Automation & IoT - David Delab...Pushing JavaEE outside of the enterprise: Home Automation & IoT - David Delab...
Pushing JavaEE outside of the enterprise: Home Automation & IoT - David Delab...Codemotion Tel Aviv
 
The M&T Story
The M&T StoryThe M&T Story
The M&T StoryDarren150
 
Giaoandientuhoa10 32 hc_cooxicuaclo_caobaongoc
Giaoandientuhoa10 32 hc_cooxicuaclo_caobaongocGiaoandientuhoa10 32 hc_cooxicuaclo_caobaongoc
Giaoandientuhoa10 32 hc_cooxicuaclo_caobaongocGem Eden II
 
박홍근홈패션 사보 2014 봄호
박홍근홈패션 사보 2014 봄호박홍근홈패션 사보 2014 봄호
박홍근홈패션 사보 2014 봄호phghome
 
Flight Physiology
Flight PhysiologyFlight Physiology
Flight Physiologysh k
 
마마인하우스No17 web
마마인하우스No17 web마마인하우스No17 web
마마인하우스No17 webphghome
 
Бизнес в интернете
Бизнес в интернетеБизнес в интернете
Бизнес в интернетеColor-IT
 
Planning 10
Planning 10Planning 10
Planning 10Tiamat14
 
Araldite Guia de selección de pastas de modelado Renpaste. Antala Industria (...
Araldite Guia de selección de pastas de modelado Renpaste. Antala Industria (...Araldite Guia de selección de pastas de modelado Renpaste. Antala Industria (...
Araldite Guia de selección de pastas de modelado Renpaste. Antala Industria (...Antala Industria
 
Берёзе
БерёзеБерёзе
Берёзеgexarvest
 
Industry Background -Expertise- CRC-2016
Industry Background -Expertise- CRC-2016Industry Background -Expertise- CRC-2016
Industry Background -Expertise- CRC-2016Carl Citelli
 
Patio covers concrete
Patio covers concretePatio covers concrete
Patio covers concretesierraoutdoor
 

Viewers also liked (19)

Q&S Engineer
Q&S EngineerQ&S Engineer
Q&S Engineer
 
українська література
українська літератураукраїнська література
українська література
 
mortgage and outreach resume
mortgage and outreach resumemortgage and outreach resume
mortgage and outreach resume
 
Pushing JavaEE outside of the enterprise: Home Automation & IoT - David Delab...
Pushing JavaEE outside of the enterprise: Home Automation & IoT - David Delab...Pushing JavaEE outside of the enterprise: Home Automation & IoT - David Delab...
Pushing JavaEE outside of the enterprise: Home Automation & IoT - David Delab...
 
The M&T Story
The M&T StoryThe M&T Story
The M&T Story
 
Giaoandientuhoa10 32 hc_cooxicuaclo_caobaongoc
Giaoandientuhoa10 32 hc_cooxicuaclo_caobaongocGiaoandientuhoa10 32 hc_cooxicuaclo_caobaongoc
Giaoandientuhoa10 32 hc_cooxicuaclo_caobaongoc
 
Articles en silent way_13
Articles en silent way_13Articles en silent way_13
Articles en silent way_13
 
박홍근홈패션 사보 2014 봄호
박홍근홈패션 사보 2014 봄호박홍근홈패션 사보 2014 봄호
박홍근홈패션 사보 2014 봄호
 
Flight Physiology
Flight PhysiologyFlight Physiology
Flight Physiology
 
마마인하우스No17 web
마마인하우스No17 web마마인하우스No17 web
마마인하우스No17 web
 
Irregular verbs.
Irregular verbs.Irregular verbs.
Irregular verbs.
 
Бизнес в интернете
Бизнес в интернетеБизнес в интернете
Бизнес в интернете
 
Articles en history_1
Articles en history_1Articles en history_1
Articles en history_1
 
Planning 10
Planning 10Planning 10
Planning 10
 
Весна
ВеснаВесна
Весна
 
Araldite Guia de selección de pastas de modelado Renpaste. Antala Industria (...
Araldite Guia de selección de pastas de modelado Renpaste. Antala Industria (...Araldite Guia de selección de pastas de modelado Renpaste. Antala Industria (...
Araldite Guia de selección de pastas de modelado Renpaste. Antala Industria (...
 
Берёзе
БерёзеБерёзе
Берёзе
 
Industry Background -Expertise- CRC-2016
Industry Background -Expertise- CRC-2016Industry Background -Expertise- CRC-2016
Industry Background -Expertise- CRC-2016
 
Patio covers concrete
Patio covers concretePatio covers concrete
Patio covers concrete
 

Similar to Mobile Security Attacks: A Glimpse from the Trenches - Yair Amit, Skycure

i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...ProductNation/iSPIRT
 
Debunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSecDebunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSecNowSecure
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldApperian
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile SecurityAVG Technologies AU
 
Security Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSecurity Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSalesforce Developers
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldEmil Tan
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Advanced monitoring
 
Building a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing BlueprintBuilding a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing BlueprintNowSecure
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Amazon Web Services
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?Zscaler
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?Tyler Shields
 
DEF CON 23 - Sam Bowne - workshop android security auditing mobile apps
DEF CON 23 - Sam Bowne - workshop android security auditing mobile appsDEF CON 23 - Sam Bowne - workshop android security auditing mobile apps
DEF CON 23 - Sam Bowne - workshop android security auditing mobile appsFelipe Prado
 
i7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7Networks
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Advanced monitoring
 
UKLUG 2011 - iOS devices in the enterprise
UKLUG 2011 - iOS devices in the enterpriseUKLUG 2011 - iOS devices in the enterprise
UKLUG 2011 - iOS devices in the enterpriseRené Winkelmeyer
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application SecurityMarie Weaver
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference ArchitectureFrom Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference ArchitectureNowSecure
 

Similar to Mobile Security Attacks: A Glimpse from the Trenches - Yair Amit, Skycure (20)

Cloud controls final2
Cloud controls final2Cloud controls final2
Cloud controls final2
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
 
Debunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSecDebunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSec
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
Security Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSecurity Best Practices for Mobile Development
Security Best Practices for Mobile Development
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 
Building a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing BlueprintBuilding a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing Blueprint
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
DEF CON 23 - Sam Bowne - workshop android security auditing mobile apps
DEF CON 23 - Sam Bowne - workshop android security auditing mobile appsDEF CON 23 - Sam Bowne - workshop android security auditing mobile apps
DEF CON 23 - Sam Bowne - workshop android security auditing mobile apps
 
i7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprises
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
 
UKLUG 2011 - iOS devices in the enterprise
UKLUG 2011 - iOS devices in the enterpriseUKLUG 2011 - iOS devices in the enterprise
UKLUG 2011 - iOS devices in the enterprise
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference ArchitectureFrom Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
 

More from Codemotion Tel Aviv

Keynote: Trends in Modern Application Development - Gilly Dekel, IBM
Keynote: Trends in Modern Application Development - Gilly Dekel, IBMKeynote: Trends in Modern Application Development - Gilly Dekel, IBM
Keynote: Trends in Modern Application Development - Gilly Dekel, IBMCodemotion Tel Aviv
 
Angular is one fire(base)! - Shmuela Jacobs
Angular is one fire(base)! - Shmuela JacobsAngular is one fire(base)! - Shmuela Jacobs
Angular is one fire(base)! - Shmuela JacobsCodemotion Tel Aviv
 
Demystifying docker networking black magic - Lorenzo Fontana, Kiratech
Demystifying docker networking black magic - Lorenzo Fontana, KiratechDemystifying docker networking black magic - Lorenzo Fontana, Kiratech
Demystifying docker networking black magic - Lorenzo Fontana, KiratechCodemotion Tel Aviv
 
Faster deep learning solutions from training to inference - Amitai Armon & Ni...
Faster deep learning solutions from training to inference - Amitai Armon & Ni...Faster deep learning solutions from training to inference - Amitai Armon & Ni...
Faster deep learning solutions from training to inference - Amitai Armon & Ni...Codemotion Tel Aviv
 
Facts about multithreading that'll keep you up at night - Guy Bar on, Vonage
Facts about multithreading that'll keep you up at night - Guy Bar on, VonageFacts about multithreading that'll keep you up at night - Guy Bar on, Vonage
Facts about multithreading that'll keep you up at night - Guy Bar on, VonageCodemotion Tel Aviv
 
Master the Art of the AST (and Take Control of Your JS!) - Yonatan Mevorach, ...
Master the Art of the AST (and Take Control of Your JS!) - Yonatan Mevorach, ...Master the Art of the AST (and Take Control of Your JS!) - Yonatan Mevorach, ...
Master the Art of the AST (and Take Control of Your JS!) - Yonatan Mevorach, ...Codemotion Tel Aviv
 
Unleash the power of angular Reactive Forms - Nir Kaufman, 500Tech
Unleash the power of angular Reactive Forms - Nir Kaufman, 500TechUnleash the power of angular Reactive Forms - Nir Kaufman, 500Tech
Unleash the power of angular Reactive Forms - Nir Kaufman, 500TechCodemotion Tel Aviv
 
Actors and Microservices - Can two walk together? - Rotem Hermon, Gigya
Actors and Microservices - Can two walk together? - Rotem Hermon, GigyaActors and Microservices - Can two walk together? - Rotem Hermon, Gigya
Actors and Microservices - Can two walk together? - Rotem Hermon, GigyaCodemotion Tel Aviv
 
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...Codemotion Tel Aviv
 
My Minecraft Smart Home: Prototyping the internet of uncanny things - Sascha ...
My Minecraft Smart Home: Prototyping the internet of uncanny things - Sascha ...My Minecraft Smart Home: Prototyping the internet of uncanny things - Sascha ...
My Minecraft Smart Home: Prototyping the internet of uncanny things - Sascha ...Codemotion Tel Aviv
 
Distributed Systems explained (with NodeJS) - Bruno Bossola, JUG Torino
Distributed Systems explained (with NodeJS) - Bruno Bossola, JUG TorinoDistributed Systems explained (with NodeJS) - Bruno Bossola, JUG Torino
Distributed Systems explained (with NodeJS) - Bruno Bossola, JUG TorinoCodemotion Tel Aviv
 
Containerised ASP.NET Core apps with Kubernetes
Containerised ASP.NET Core apps with KubernetesContainerised ASP.NET Core apps with Kubernetes
Containerised ASP.NET Core apps with KubernetesCodemotion Tel Aviv
 
Fullstack DDD with ASP.NET Core and Anguar 2 - Ronald Harmsen, NForza
Fullstack DDD with ASP.NET Core and Anguar 2 - Ronald Harmsen, NForzaFullstack DDD with ASP.NET Core and Anguar 2 - Ronald Harmsen, NForza
Fullstack DDD with ASP.NET Core and Anguar 2 - Ronald Harmsen, NForzaCodemotion Tel Aviv
 
The Art of Decomposing Monoliths - Kfir Bloch, Wix
The Art of Decomposing Monoliths - Kfir Bloch, WixThe Art of Decomposing Monoliths - Kfir Bloch, Wix
The Art of Decomposing Monoliths - Kfir Bloch, WixCodemotion Tel Aviv
 
SOA Lessons Learnt (or Microservices done Better) - Sean Farmar, Particular S...
SOA Lessons Learnt (or Microservices done Better) - Sean Farmar, Particular S...SOA Lessons Learnt (or Microservices done Better) - Sean Farmar, Particular S...
SOA Lessons Learnt (or Microservices done Better) - Sean Farmar, Particular S...Codemotion Tel Aviv
 
S3, Cassandra or Outer Space? Dumping Time Series Data using Spark - Demi Ben...
S3, Cassandra or Outer Space? Dumping Time Series Data using Spark - Demi Ben...S3, Cassandra or Outer Space? Dumping Time Series Data using Spark - Demi Ben...
S3, Cassandra or Outer Space? Dumping Time Series Data using Spark - Demi Ben...Codemotion Tel Aviv
 
Web based virtual reality - Tanay Pant, Mozilla
Web based virtual reality - Tanay Pant, MozillaWeb based virtual reality - Tanay Pant, Mozilla
Web based virtual reality - Tanay Pant, MozillaCodemotion Tel Aviv
 
Material Design Demytified - Ran Nachmany, Google
Material Design Demytified - Ran Nachmany, GoogleMaterial Design Demytified - Ran Nachmany, Google
Material Design Demytified - Ran Nachmany, GoogleCodemotion Tel Aviv
 
All the reasons for choosing react js that you didn't know about - Avi Marcus...
All the reasons for choosing react js that you didn't know about - Avi Marcus...All the reasons for choosing react js that you didn't know about - Avi Marcus...
All the reasons for choosing react js that you didn't know about - Avi Marcus...Codemotion Tel Aviv
 
C10k and beyond - Uri Shamay, Akamai
C10k and beyond - Uri Shamay, AkamaiC10k and beyond - Uri Shamay, Akamai
C10k and beyond - Uri Shamay, AkamaiCodemotion Tel Aviv
 

More from Codemotion Tel Aviv (20)

Keynote: Trends in Modern Application Development - Gilly Dekel, IBM
Keynote: Trends in Modern Application Development - Gilly Dekel, IBMKeynote: Trends in Modern Application Development - Gilly Dekel, IBM
Keynote: Trends in Modern Application Development - Gilly Dekel, IBM
 
Angular is one fire(base)! - Shmuela Jacobs
Angular is one fire(base)! - Shmuela JacobsAngular is one fire(base)! - Shmuela Jacobs
Angular is one fire(base)! - Shmuela Jacobs
 
Demystifying docker networking black magic - Lorenzo Fontana, Kiratech
Demystifying docker networking black magic - Lorenzo Fontana, KiratechDemystifying docker networking black magic - Lorenzo Fontana, Kiratech
Demystifying docker networking black magic - Lorenzo Fontana, Kiratech
 
Faster deep learning solutions from training to inference - Amitai Armon & Ni...
Faster deep learning solutions from training to inference - Amitai Armon & Ni...Faster deep learning solutions from training to inference - Amitai Armon & Ni...
Faster deep learning solutions from training to inference - Amitai Armon & Ni...
 
Facts about multithreading that'll keep you up at night - Guy Bar on, Vonage
Facts about multithreading that'll keep you up at night - Guy Bar on, VonageFacts about multithreading that'll keep you up at night - Guy Bar on, Vonage
Facts about multithreading that'll keep you up at night - Guy Bar on, Vonage
 
Master the Art of the AST (and Take Control of Your JS!) - Yonatan Mevorach, ...
Master the Art of the AST (and Take Control of Your JS!) - Yonatan Mevorach, ...Master the Art of the AST (and Take Control of Your JS!) - Yonatan Mevorach, ...
Master the Art of the AST (and Take Control of Your JS!) - Yonatan Mevorach, ...
 
Unleash the power of angular Reactive Forms - Nir Kaufman, 500Tech
Unleash the power of angular Reactive Forms - Nir Kaufman, 500TechUnleash the power of angular Reactive Forms - Nir Kaufman, 500Tech
Unleash the power of angular Reactive Forms - Nir Kaufman, 500Tech
 
Actors and Microservices - Can two walk together? - Rotem Hermon, Gigya
Actors and Microservices - Can two walk together? - Rotem Hermon, GigyaActors and Microservices - Can two walk together? - Rotem Hermon, Gigya
Actors and Microservices - Can two walk together? - Rotem Hermon, Gigya
 
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
 
My Minecraft Smart Home: Prototyping the internet of uncanny things - Sascha ...
My Minecraft Smart Home: Prototyping the internet of uncanny things - Sascha ...My Minecraft Smart Home: Prototyping the internet of uncanny things - Sascha ...
My Minecraft Smart Home: Prototyping the internet of uncanny things - Sascha ...
 
Distributed Systems explained (with NodeJS) - Bruno Bossola, JUG Torino
Distributed Systems explained (with NodeJS) - Bruno Bossola, JUG TorinoDistributed Systems explained (with NodeJS) - Bruno Bossola, JUG Torino
Distributed Systems explained (with NodeJS) - Bruno Bossola, JUG Torino
 
Containerised ASP.NET Core apps with Kubernetes
Containerised ASP.NET Core apps with KubernetesContainerised ASP.NET Core apps with Kubernetes
Containerised ASP.NET Core apps with Kubernetes
 
Fullstack DDD with ASP.NET Core and Anguar 2 - Ronald Harmsen, NForza
Fullstack DDD with ASP.NET Core and Anguar 2 - Ronald Harmsen, NForzaFullstack DDD with ASP.NET Core and Anguar 2 - Ronald Harmsen, NForza
Fullstack DDD with ASP.NET Core and Anguar 2 - Ronald Harmsen, NForza
 
The Art of Decomposing Monoliths - Kfir Bloch, Wix
The Art of Decomposing Monoliths - Kfir Bloch, WixThe Art of Decomposing Monoliths - Kfir Bloch, Wix
The Art of Decomposing Monoliths - Kfir Bloch, Wix
 
SOA Lessons Learnt (or Microservices done Better) - Sean Farmar, Particular S...
SOA Lessons Learnt (or Microservices done Better) - Sean Farmar, Particular S...SOA Lessons Learnt (or Microservices done Better) - Sean Farmar, Particular S...
SOA Lessons Learnt (or Microservices done Better) - Sean Farmar, Particular S...
 
S3, Cassandra or Outer Space? Dumping Time Series Data using Spark - Demi Ben...
S3, Cassandra or Outer Space? Dumping Time Series Data using Spark - Demi Ben...S3, Cassandra or Outer Space? Dumping Time Series Data using Spark - Demi Ben...
S3, Cassandra or Outer Space? Dumping Time Series Data using Spark - Demi Ben...
 
Web based virtual reality - Tanay Pant, Mozilla
Web based virtual reality - Tanay Pant, MozillaWeb based virtual reality - Tanay Pant, Mozilla
Web based virtual reality - Tanay Pant, Mozilla
 
Material Design Demytified - Ran Nachmany, Google
Material Design Demytified - Ran Nachmany, GoogleMaterial Design Demytified - Ran Nachmany, Google
Material Design Demytified - Ran Nachmany, Google
 
All the reasons for choosing react js that you didn't know about - Avi Marcus...
All the reasons for choosing react js that you didn't know about - Avi Marcus...All the reasons for choosing react js that you didn't know about - Avi Marcus...
All the reasons for choosing react js that you didn't know about - Avi Marcus...
 
C10k and beyond - Uri Shamay, Akamai
C10k and beyond - Uri Shamay, AkamaiC10k and beyond - Uri Shamay, Akamai
C10k and beyond - Uri Shamay, Akamai
 

Recently uploaded

Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 

Recently uploaded (20)

Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

Mobile Security Attacks: A Glimpse from the Trenches - Yair Amit, Skycure