SlideShare uma empresa Scribd logo
1 de 70
Mobile Security ,[object Object],[object Object],[object Object]
Who am i ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key points & Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction Mobile Security – Fabio Pietrosanti Mobile Security
Mobile phones today ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Introduction
Mobile phones today Mobile Security – Fabio Pietrosanti Introduction
It’s something personal ,[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Introduction
It’s something critical ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Introduction
Difference between mobile security & IT security Mobile Security – Fabio Pietrosanti Mobile Security
Too much trust ,[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Difference between mobile security & IT Security
Users download everything: new social risks! ,[object Object],Titolo - Autore 50.000 users 500.000 users
Too difficult to deal with  ,[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Difference between mobile security & IT Security
Too many sw/hw platforms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Difference between mobile security & IT Security
Vulnerability management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Difference between mobile security & IT Security
Vulnerability count Mobile Security – Fabio Pietrosanti Difference between mobile security & IT Security Source: iSec
Mobile Device Security Mobile Security – Fabio Pietrosanti Mobile Security
Reduced security by hw design ,[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Device Security
Reduced security by hw design ,[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Device Security
Devices access and authority ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Device Security
Devices access and authority ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Device Security
About security model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Titolo - Autore ,[object Object]
About security model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Titolo - Autore ,[object Object]
Mobile security model:  old school ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Device Security
Mobile security model  old school but Enterprise ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Device Security
Mobile security model  iPhone ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Device Security
Mobile security model  Symbian ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Device Security
Mobile security model –  Android ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Device Security
Brew & NucleOS ,[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Device Security
Development language security ,[object Object],Mobile Security – Fabio Pietrosanti Mobile Device Security Blackberry RIMOS J2ME MIDP 2.0 No native code Iphone Objective-C NX Stack/heap protection Windows Mobile .NET / C++ GS enhanced security Nokia/Symbian C++ Enhanced memory management / trusted Android/Linux Java & NDK Java security model
Mobile Hacking  & Attack vector Mobile Security – Fabio Pietrosanti Mobile Security
Mobile security research ,[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Mobile security research - 2008 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Mobile security research 2009 (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Mobile security research 2009 (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Mobile security research 2009 (3) ,[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
From the Attack layers ,[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Link layer security - GSM ,[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Link layer security - UMTS ,[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Link layer security – WiFi ,[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Link layer security  Rogue operators roaming  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
MMS security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
SMS security (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
SMS security (2) ,[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Bluetooth (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Bluetooth (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
NFC – what’s that? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
NFC – example use ,[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
NFC - security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Mobile Web Security - WAP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Mobile Web Security – WEB  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Mobile Web Security WEB/SSL  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Mobile Web Security – SSL UI ,[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Mobile Web Security – SSL UI Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector Tnx to Rsnake & Masabi
Mobile VPN ,[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Voice interception ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Location Based Services or  Location Based Intelligence? (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Location Based Services or  Location Based Intelligence? (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Mobile malware - spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Mobile malware – virus/worm (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Mobile malware – virus/worm (2) ,[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Mobile Forensics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Extension of organization: The operator ,[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
Some near future scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector
The economic risks TLC & Financial frauds Mobile Security – Fabio Pietrosanti Mobile Security
Basic of phone fraud ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti The economic risks
Fraud against user/corporate ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti The economic risks
Security of mobile banking ,[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti The economic risks
Conclusion Mobile Security – Fabio Pietrosanti Mobile Security
Just some points ,[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Security – Fabio Pietrosanti Conclusion
Thanks for you attention! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
Lookout
 

Mais procurados (20)

Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Voice securityprotocol review
Voice securityprotocol reviewVoice securityprotocol review
Voice securityprotocol review
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
 
Mobile Security Research Projects Help
Mobile Security  Research Projects HelpMobile Security  Research Projects Help
Mobile Security Research Projects Help
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Voice communication security
Voice communication securityVoice communication security
Voice communication security
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Leaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to KnowLeaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to Know
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Cybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile EnvironmentCybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile Environment
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security Essentials
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 

Destaque

Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTe
Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTeMobile Privacy Consumer Survey Results by Harris Interactive & TRUSTe
Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTe
Janet Jaiswal
 
Broadband wireless communications
Broadband wireless communicationsBroadband wireless communications
Broadband wireless communications
Nagu Omsi
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
Muthu Kumar
 

Destaque (17)

Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTe
Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTeMobile Privacy Consumer Survey Results by Harris Interactive & TRUSTe
Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTe
 
Advances In Satellite Communication
Advances In Satellite CommunicationAdvances In Satellite Communication
Advances In Satellite Communication
 
Mobile based authentication and payment
Mobile based authentication and paymentMobile based authentication and payment
Mobile based authentication and payment
 
Security and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud ComputingSecurity and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud Computing
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
Mobile App Security Testing -2
Mobile App Security Testing -2Mobile App Security Testing -2
Mobile App Security Testing -2
 
Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...
Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...
Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...
 
Mobile Application Security Code Reviews
Mobile Application Security Code ReviewsMobile Application Security Code Reviews
Mobile Application Security Code Reviews
 
Broadband wireless communications
Broadband wireless communicationsBroadband wireless communications
Broadband wireless communications
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing security
 
Cognitive radio
Cognitive radioCognitive radio
Cognitive radio
 
Humanoid robot
Humanoid robotHumanoid robot
Humanoid robot
 
MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKS
 
Security Code Review for .NET - Sherif Koussa (OWASP Ottawa)
Security Code Review for .NET - Sherif Koussa (OWASP Ottawa)Security Code Review for .NET - Sherif Koussa (OWASP Ottawa)
Security Code Review for .NET - Sherif Koussa (OWASP Ottawa)
 
Mobile_app_security
Mobile_app_securityMobile_app_security
Mobile_app_security
 

Semelhante a 2010: Mobile Security - WHYMCA Developer Conference

Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
Tyler Shields
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environment
IBM Software India
 
Mobile SecurityKalyan BereKodapeComputer Security .docx
Mobile SecurityKalyan BereKodapeComputer Security .docxMobile SecurityKalyan BereKodapeComputer Security .docx
Mobile SecurityKalyan BereKodapeComputer Security .docx
roushhsiu
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
mariuse18nolet
 
Track f evolving trusted platforms - arm
Track f   evolving trusted platforms - armTrack f   evolving trusted platforms - arm
Track f evolving trusted platforms - arm
chiportal
 

Semelhante a 2010: Mobile Security - WHYMCA Developer Conference (20)

Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
Mobile (in)security ?
Mobile (in)security ?Mobile (in)security ?
Mobile (in)security ?
 
Mobile (in)security? @ Mobile Edge '14
Mobile (in)security? @ Mobile Edge '14 Mobile (in)security? @ Mobile Edge '14
Mobile (in)security? @ Mobile Edge '14
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environment
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Mobile SecurityKalyan BereKodapeComputer Security .docx
Mobile SecurityKalyan BereKodapeComputer Security .docxMobile SecurityKalyan BereKodapeComputer Security .docx
Mobile SecurityKalyan BereKodapeComputer Security .docx
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdf
 
sym
symsym
sym
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 security
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
IoT Security.pdf
IoT Security.pdfIoT Security.pdf
IoT Security.pdf
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
Mobile Day - App (In)security
Mobile Day - App (In)securityMobile Day - App (In)security
Mobile Day - App (In)security
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
Track f evolving trusted platforms - arm
Track f   evolving trusted platforms - armTrack f   evolving trusted platforms - arm
Track f evolving trusted platforms - arm
 

Mais de Fabio Pietrosanti

2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
Fabio Pietrosanti
 
2003 CNR Security Task Force: Wireless (In)security
2003 CNR Security Task Force: Wireless (In)security2003 CNR Security Task Force: Wireless (In)security
2003 CNR Security Task Force: Wireless (In)security
Fabio Pietrosanti
 
2007: Infosecurity Italy: Voice Privacy Security (flash talk)
2007: Infosecurity Italy: Voice Privacy Security (flash talk)2007: Infosecurity Italy: Voice Privacy Security (flash talk)
2007: Infosecurity Italy: Voice Privacy Security (flash talk)
Fabio Pietrosanti
 
2006: Infosecurity Italy: Tecnologie di Firma Digitale e Tutela della Riserva...
2006: Infosecurity Italy: Tecnologie di Firma Digitale e Tutela della Riserva...2006: Infosecurity Italy: Tecnologie di Firma Digitale e Tutela della Riserva...
2006: Infosecurity Italy: Tecnologie di Firma Digitale e Tutela della Riserva...
Fabio Pietrosanti
 
2005: E-privacy 2005: Pgp Luci E Ombre
2005: E-privacy 2005: Pgp Luci E Ombre2005: E-privacy 2005: Pgp Luci E Ombre
2005: E-privacy 2005: Pgp Luci E Ombre
Fabio Pietrosanti
 
2004: Webbit Padova 04: Presentazione Sikurezza.Org
2004: Webbit Padova 04: Presentazione Sikurezza.Org2004: Webbit Padova 04: Presentazione Sikurezza.Org
2004: Webbit Padova 04: Presentazione Sikurezza.Org
Fabio Pietrosanti
 
2002: SMAU ITBH: Wireless (in)security
2002: SMAU ITBH: Wireless (in)security2002: SMAU ITBH: Wireless (in)security
2002: SMAU ITBH: Wireless (in)security
Fabio Pietrosanti
 
2004: Webbit Padova 04: Wireless (in)security
2004: Webbit Padova 04: Wireless (in)security2004: Webbit Padova 04: Wireless (in)security
2004: Webbit Padova 04: Wireless (in)security
Fabio Pietrosanti
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
Fabio Pietrosanti
 

Mais de Fabio Pietrosanti (9)

2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
 
2003 CNR Security Task Force: Wireless (In)security
2003 CNR Security Task Force: Wireless (In)security2003 CNR Security Task Force: Wireless (In)security
2003 CNR Security Task Force: Wireless (In)security
 
2007: Infosecurity Italy: Voice Privacy Security (flash talk)
2007: Infosecurity Italy: Voice Privacy Security (flash talk)2007: Infosecurity Italy: Voice Privacy Security (flash talk)
2007: Infosecurity Italy: Voice Privacy Security (flash talk)
 
2006: Infosecurity Italy: Tecnologie di Firma Digitale e Tutela della Riserva...
2006: Infosecurity Italy: Tecnologie di Firma Digitale e Tutela della Riserva...2006: Infosecurity Italy: Tecnologie di Firma Digitale e Tutela della Riserva...
2006: Infosecurity Italy: Tecnologie di Firma Digitale e Tutela della Riserva...
 
2005: E-privacy 2005: Pgp Luci E Ombre
2005: E-privacy 2005: Pgp Luci E Ombre2005: E-privacy 2005: Pgp Luci E Ombre
2005: E-privacy 2005: Pgp Luci E Ombre
 
2004: Webbit Padova 04: Presentazione Sikurezza.Org
2004: Webbit Padova 04: Presentazione Sikurezza.Org2004: Webbit Padova 04: Presentazione Sikurezza.Org
2004: Webbit Padova 04: Presentazione Sikurezza.Org
 
2002: SMAU ITBH: Wireless (in)security
2002: SMAU ITBH: Wireless (in)security2002: SMAU ITBH: Wireless (in)security
2002: SMAU ITBH: Wireless (in)security
 
2004: Webbit Padova 04: Wireless (in)security
2004: Webbit Padova 04: Wireless (in)security2004: Webbit Padova 04: Wireless (in)security
2004: Webbit Padova 04: Wireless (in)security
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

2010: Mobile Security - WHYMCA Developer Conference

  • 1.
  • 2.
  • 3.
  • 4. Introduction Mobile Security – Fabio Pietrosanti Mobile Security
  • 5.
  • 6. Mobile phones today Mobile Security – Fabio Pietrosanti Introduction
  • 7.
  • 8.
  • 9. Difference between mobile security & IT security Mobile Security – Fabio Pietrosanti Mobile Security
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Vulnerability count Mobile Security – Fabio Pietrosanti Difference between mobile security & IT Security Source: iSec
  • 16. Mobile Device Security Mobile Security – Fabio Pietrosanti Mobile Security
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. Mobile Hacking & Attack vector Mobile Security – Fabio Pietrosanti Mobile Security
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53. Mobile Web Security – SSL UI Mobile Security – Fabio Pietrosanti Mobile Hacking & Attack Vector Tnx to Rsnake & Masabi
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64. The economic risks TLC & Financial frauds Mobile Security – Fabio Pietrosanti Mobile Security
  • 65.
  • 66.
  • 67.
  • 68. Conclusion Mobile Security – Fabio Pietrosanti Mobile Security
  • 69.
  • 70.

Notas do Editor

  1. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  2. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  3. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  4. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  5. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  6. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  7. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  8. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  9. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  10. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  11. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  12. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  13. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  14. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  15. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  16. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  17. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  18. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  19. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  20. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  21. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  22. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  23. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  24. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  25. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  26. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  27. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  28. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  29. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  30. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  31. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  32. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  33. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  34. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  35. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  36. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  37. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  38. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  39. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  40. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  41. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  42. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  43. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  44. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  45. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  46. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  47. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  48. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  49. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  50. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  51. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  52. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  53. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  54. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  55. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  56. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  57. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  58. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  59. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  60. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  61. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  62. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”
  63. Per inserire Titolo – Autore aprile il menu “Visualizza” e scegliere “Intestazione e piè pagina…”