Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Mobile Device Security Threats: Malware Distribution and Corporate Vulnerabilities - Lecture 3

x33fcon via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn how mobile devices can create critical security vulnerabilities in corporate environments through this 35-minute conference talk from x33fcon. Explore the rising threats of mobile-based spying and spoofing techniques, with specific focus on malware like Pegasus and Hydra that exploit personal devices as cybersecurity blind spots. Gain insights into malware distribution methods, bypassing techniques, deeplinks usage, notification systems, command and control connections, data source vulnerabilities, and advanced concepts like metadata scraping, steganography and image recognition. Understand the potential risks of employee mobile devices compromising expensive corporate security measures and develop strategies to address these emerging threats.

Syllabus

Intro
Malware Distribution - Crafting
Malware Distribution-Spread
Bypassing Techniques
Example of deeplinks use
Example of notification and c2c
Connection to c2c
Datasources
Scraping everything
Exif/metadata
Steganography
Image recognition

Taught by

x33fcon

Reviews

Start your review of Mobile Device Security Threats: Malware Distribution and Corporate Vulnerabilities - Lecture 3

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.