Hacking mobile devices
Basic attacks Voic hacking –An introduction and Wikipediaintroduction Wikipedia –Murdoch scandal in UKMurdoch scandal –A how to do it (untested)how to do it Bluetooth hacking – An example of the hackexample –A video using the Ultimate Bluetoothvideo –An YouTube video also using BluetoothYouTube video –A summary of the toolssummary
Trojans & viruses Android main target –Android number one targetnumber one –Forecast for 2012 mobile hackingForecast for 2012 –drive-by hacking?drive-by hacking –New virus/Trojans for AndroidNew Safari and WebKit exploits –overviewoverview – in iOS 5.1in iOS 5.1 Botnets future? –A presentationpresentation –Botnets from the skyBotnets from the sky
Near Field Communications NFC introduction –WikipediaWikipedia –A Webinar: NFC not only for cardsA Webinar: NFC not only for cards –A demonstration of paymentA demonstration of payment Payment alternative systems –Google WalletGoogle Wallet –VISA NFC WalletVISA NFC Wallet –Apple NFC paymentsApple NFC payments Hacking NFC –Introduction to NFC SecurityIntroduction to NFC Security –Attacking NFC mobile phonesAttacking NFC mobile phones
Defense mechanisms Introduction –risk managementrisk management –small business and mobilesmall business and mobile –Sophos: Securing Smartphones & Tablets for DummiesSecuring Smartphones & Tablets for Dummies Change default –Bluetooth default 000, etc, needs to be changedneeds to be changed Anti-virus –McAfee tips to avoid bad AppsMcAfee tips –AVG, Kaspersky, Lookout, McAfee, Norton/Symantec.AVGKasperskyLookoutMcAfeeNorton/Symantec