Mobile threats are equal opportunity in nature. Criminals don't discriminate based on age, profession, location, or socio-economic status. Government employees are major targets. We will start with a discussion of OS security patch release and adoption for both iOS and Android, followed by vulnerability statistics for mobile applications. We will identify threats (new, old, network, malware, phishing) that target mobile devices, including updates on Android banking trojans, malicious iOS profiles, third-party stores, the dangers of free Wi-Fi, and attack chains that lead to device compromise. We will also describe threats to Chromebooks. We will round out the presentation with a series of threat maps and trend graphs that focus on cities and counties in Texas and threats around the Texas border. These maps show real threats Zimperium has captured and mitigated “in the wild” by city/state/region. GPS data is collected from customers who “opt in” when we mitigate a threat and drop a pin on the map. Adam Wosotowsky curates the data we render on our maps, which is fascinating and detailed.
Session Objectives:
- Learn how threat mapping provides real and actionable intelligence around threats we see in the wild in Texas, on the Texas border, and globally.
- Understand how to close cybersecurity gaps that affect mobile security.
- Identify threats, including new data around Banking Trojans, to iOS, Android, and Chromebook devices.
900 Barton Springs Rd
Austin, TX 78704
United States