Mobile Device Security Threats: Malware Distribution and Corporate Vulnerabilities - Lecture 3
Google AI Professional Certificate - Learn AI Skills That Get You Hired
Get 20% off all career paths from fullstack to AI
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn how mobile devices can create critical security vulnerabilities in corporate environments through this 35-minute conference talk from x33fcon. Explore the rising threats of mobile-based spying and spoofing techniques, with specific focus on malware like Pegasus and Hydra that exploit personal devices as cybersecurity blind spots. Gain insights into malware distribution methods, bypassing techniques, deeplinks usage, notification systems, command and control connections, data source vulnerabilities, and advanced concepts like metadata scraping, steganography and image recognition. Understand the potential risks of employee mobile devices compromising expensive corporate security measures and develop strategies to address these emerging threats.
Syllabus
Intro
Malware Distribution - Crafting
Malware Distribution-Spread
Bypassing Techniques
Example of deeplinks use
Example of notification and c2c
Connection to c2c
Datasources
Scraping everything
Exif/metadata
Steganography
Image recognition
Taught by
x33fcon