Tag Archive

DeepSec 2013 Video: Cracking Open “Secure” Android Containers

Published on January 19, 2014 By lynx

Cell phones, especially the smart ones, become more and more part of your company’s infrastructure. These devices accumulate software (a.k.a. „apps“), authentication tokens, passwords, and a lot of data worthy of protection. While smartphone systems have their own protection mechanisms, not every one of them might work reliably. Chris John Riley explains in his presentation […]

DeepSec 2013 Talk: Bypassing Security Controls With Mobile Devices

Published on November 15, 2013 By lynx

How do you counter threats emerging from a new trend? Well, standard practice is to buy a new appliance, add-on, or similar magic trick. People do this currently with the trend of Bring Your Own Device (BYOD). Once you say yes to BYOD, you just gave Santa Claus (or your chief financial officer) more options […]