Description: iSEC Partners just published some recommendations (https://www.isecpartners.com/files/iSEC_Aurora_Response_Recommendations.pdf) on responding to these attacks, and they include some of the most detailed information about the attacks and how to mitigate them yet shown. My co-worker Alex Stamos recently presented this at a number of large US companies, and a summary version at RSA. I would be happy to present some of our recommendations, and give a talk about the incident and responding to it. Some of the strategies are quite technical and rather interesting. While we talk a bit about using some commercial tools, we don.t have a sales relationship with those companies, and I assure you that there won.t be any sales pitches.
Topic of Workshop: Android Reverse Engineering . 120 minutes
Language: English
Description of Workshop: It is a follow up on my work last year with Android security, where I show how to explore the closed, and/or binary only parts of Android platforms. This includes discussions of how android distributions can be hardened, examining the hardening that has been done, and new Android security features that have been introduced since the Cupcake release of Android (version 1.5). I would also talk a bit about some of the Android devices on the market, including information gleaned from reverse engineering the devices, focusing on some of the most interesting new directions that have appeared like the first Android e-Reader and how the security of these devices is being handled.
Tags: securitytube , Confidence , hacking , hackers , information security , convention , computer security , Confidence 10 , Confidence-2010 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.