Practical Attacks Against MDM Solutions presented at RSAASIAJapan 2014

by Dan Koretsky,

Summary : How are mobile cyber-espionage attacks carried out? In this engaging session, we demonstrate how attackers bypass traditional mobile malware detection measures- and even circumvent common Mobile Device Management (MDM) features, such as encryption. The talk includes live demos against Android and iOS-based devices and discusses practical mitigation measures to defend against similar threats. - See more at: