Добавить
Уведомления

Mobile Device Security, Hacking, Mitigations, and Considerations

Do you include mobile devices / phones in your pen test and red team engagements? Should they be in scope? Attackers don't have scope constraints and as such, they should certainly be a consideration. During this stream, Jeroen Beckers from NVISO will take us through some use cases and tips and tricks for assessing Android and Apple devices.

12+
11 просмотров
Год назад
30 октября 2024 г.
12+
11 просмотров
Год назад
30 октября 2024 г.

Do you include mobile devices / phones in your pen test and red team engagements? Should they be in scope? Attackers don't have scope constraints and as such, they should certainly be a consideration. During this stream, Jeroen Beckers from NVISO will take us through some use cases and tips and tricks for assessing Android and Apple devices.

, чтобы оставлять комментарии