conference logo

Playlist "SIGINT10"

Attack vectors against mobile devices

tamhanna

What endangers mobile devices today? What can be done to mitigate threats? Why are mobile devices especially vulerable?