Star 0

Abstract

How are mobile cyber-espionage attacks carried out? In this engaging session, we will show how attackers bypass traditional mobile malware detection measures—and even circumvent common Mobile Device Management (MDM) features, such as encryption. The talk includes live demos against Android and iOS-based devices and discusses practical mitigation measures to defend against similar mobile threats.