National Cyber Warfare Foundation (NCWF) Forums


Black Hat 2023: Understanding Mobile Exploitation Beyond the App


0 user ratings
2023-08-20 15:59:43
milo
Blue Team (CND)

 - archive -- 

Unveiling the World of Mobile Exploitation: ARM Architecture and Beyond


Dinesh Shetty, Director, Security Engineering, Security Innovation


Mobile applications are the obvious target for cyber attacks, but a secure application won't faze a committed cyber adversary. They can exploit any mobile interface—an app, calls to the OS, and background operations. From there, they can easily go after anything they want.




Unveiling the World of Mobile Exploitation: ARM Architecture and Beyond


Dinesh Shetty, Director, Security Engineering, Security Innovation


Mobile applications are the obvious target for cyber attacks, but a secure application won't faze a committed cyber adversary. They can exploit any mobile interface—an app, calls to the OS, and background operations. From there, they can easily go after anything they want.




Source: SecurityInnovation
Source Link: https://blog.securityinnovation.com/black-hat-2023-understanding-mobile-exploitation-beyond-the-app


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Blue Team (CND)



Copyright 2012 through 2024 - National Cyber Warfare Foundation - All rights reserved worldwide.