Unveiling the World of Mobile Exploitation: ARM Architecture and Beyond

Dinesh Shetty, Director, Security Engineering, Security Innovation

Mobile applications are the obvious target for cyber attacks, but a secure application won’t faze a committed cyber adversary. They can exploit any mobile interface—an app, calls to the OS, and background operations. From there, they can easily go after anything they want.




Leave a Reply

Your email address will not be published. Required fields are marked *