Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn how mobile devices can create critical security vulnerabilities in corporate environments through this 35-minute conference talk from x33fcon. Explore the rising threats of mobile-based spying and spoofing techniques, with specific focus on malware like Pegasus and Hydra that exploit personal devices as cybersecurity blind spots. Gain insights into malware distribution methods, bypassing techniques, deeplinks usage, notification systems, command and control connections, data source vulnerabilities, and advanced concepts like metadata scraping, steganography and image recognition. Understand the potential risks of employee mobile devices compromising expensive corporate security measures and develop strategies to address these emerging threats.
Syllabus
Intro
Malware Distribution - Crafting
Malware Distribution-Spread
Bypassing Techniques
Example of deeplinks use
Example of notification and c2c
Connection to c2c
Datasources
Scraping everything
Exif/metadata
Steganography
Image recognition
Taught by
x33fcon