Practical Attacks Against MDM Solutions presented at RSAASIAJapan 2014

by Dan Koretsky,

Summary : How are mobile cyber-espionage attacks carried out? In this engaging session, we demonstrate how attackers bypass traditional mobile malware detection measures- and even circumvent common Mobile Device Management (MDM) features, such as encryption. The talk includes live demos against Android and iOS-based devices and discusses practical mitigation measures to defend against similar threats. - See more at: http://www.rsaconference.com/events/ap14/agenda/sessions/1468/practical-attacks-against-mdm-solutions#sthash.UXcXk958.dpuf