Mobile security is all about the protection of smartphones, tablets, laptops and all other portable computing devices and the networks they connect to. Protection from what? Protection from the seemingly never-ending threats and vulnerabilities associated with wireless computing.
The problem is compounded within the enterprise as the ongoing trend toward IT consumerization is resulting in more and more employee-owned devices connecting to the corporate network. Within companies, these technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks.
Bad actors are especially adept at targeting smartphones because they collect and compile sensitive information that can compromise the privacy of the user and the intellectual property of the company.
Smartphones have similar processing power to PCs and similar potential vulnerabilities, but unlike many computers, smartphones have an always-on connection to the internet. The amount of malicious software, known as malware, targeted at devices running Android is growing rapidly. So too is the amount of so-called adware, code that typically displays what appears to be system alerts, but are actually advertisements that urge consumers to download software.
These attacks exploit weaknesses inherent in smartphones that can come from the communication mode like Short Message Service (SMS, aka text messaging), Multimedia Messaging Service (MMS), Wi-Fi, Bluetooth and GSM. There are also exploits that target software vulnerabilities in the browser or operating system.
The good news is that developers are fighting back with an array of tools to minimize security risks.
Both iPhones and devices running Android now come with software preinstalled and turned on by default that allows you to find them if they are lost and remotely delete personal data from them if they are stolen.
VPN tunnels are also useful when you have to use public Wi-Fi, which is an extreme vulnerability because anyone can be watching your traffic. But a VPN tunnel protects your traffic 100 percent. Everything is encrypted and anonymous and you’ve eliminated the possibility of a MitM (man in the middle) attack.
Mobile Security Training
To help you stay current on mobile security matters, Tonex offers a three-day Mobile Security Training course that explores enterprise mobile security with emphasis on mobile security weaknesses and threats.
Participants also learn how attackers can utilize mobile devices to abuse and attack organizations. We show you various mobile security concerns, technical issues with mobile platforms, remediation strategies, security policies, and solutions on variety of mobile devices, smart devices and platforms including iOS (iPhone and iPad), Android, BlackBerry and Windows Phone.
- Physical security controls
- Fuzzing Android apps
- Working with SQLite Manager
- Device encryption support and threats
- Exploit tools and attacks against mobile devices
- Decompiling and reversing apps
- Mobile device overview/characteristics
- Analyzing trusted networks and untrusted content
- Security components and architectures
- Use of applications created by unknown parties
And much more.
Who Should Attend?
This class is recommended for mobile device manufacturers, application developers, mobile network operators, software companies, special ops, covert ops personnel, FBI, CIA, NSA, DoD offensive security professionals and other professionals from the Intel community.
The Tonex Way
–Presenting highly customized learning solutions is what we do. For over 30 years Tonex has worked with organizations in improving their understanding and capabilities in topics often with new development, design, optimization, regulations and compliances.
–Reasonably priced classes taught by the best trainers is the reason all kinds of organizations from Fortune 500 companies to government’s most important agencies return for updates in courses and hands-on workshops.
–Ratings tabulated from student feedback post-course evaluations show an amazing 98 percent satisfaction score.
Contact us for more information, questions, comments.