Erez Metula gave a Webinar on the Top 10 Mobile Application Vulnerabilities moderated by Mr. Taiye Lambo ( Founder and CTO of CloudeAssurance Inc.).
Check it out…
Mobile apps have access to our most sensitive data – passwords, financial and health related data, contacts, text messages, geographic locations and they are also adjacent to other apps on our mobile device with some potential implications. Can we really tell whether our apps are secure and are not “spying” on us? Can they be abused by hackers to penetrate our organization’s network and even more precious assets?
Erez will answer those questions and more focusing on Android & IOS mobile apps and their common vulnerabilities. Taiye will also discuss why performing independent penetration testing of Mobile apps and ensuring that Mobile Apps are using secure cloud service(s) is a must have in any CISO’s winning strategy. This webinar will be all about mobile apps security, how they can be hacked, the common mistakes developers make, and how to avoid such mistakes.
A must attend webinar for all CISOs, CIOs and CTOs, and all security professionals.
IoT Security – How to Collect & Protect your IoT Data
Hacking The IOT – Top 10 vulnerabilities of IOT products
Presented by: Erez Metula, Application Security Expert, AppSec Labs (Founder)
The “things” are all around us, with more to come exponentially as days go by. Smart homes, connected cities, smart medical devices, industrial IOT, you name it – they all are targets for attacks that were not possible up until recent years, when they can be accessed from the cloud and controlled from your favorite mobile app. Everybody talks about the benefits they’ll bring, but are they developed with security in mind? Can someone spy on our users? Or take control over something from the “physical” world? Or maybe manipulate with some information sent from the device to the cloud? During this talk, Erez will go over the most common security vulnerabilities that exists in IOT products, by sharing his experience as an IOT penetration tester. We’ll go over each of those vulnerabilities, and witness how they can be exploited by having a demos of the tools and techniques attackers will use against our IOT product.
Missed the event? Want to see the presentation?