On-Demand Industry Webinar
By the end of 2011, one out of every two cell phones in the United States is projected to be a smart phone on either the Apple or Android platform. These devices are being used for everything from watching videos to online banking. Training your personnel on how to keep smart phones and mobile devices secure from hacker attacks has hit a critical mass. PaRaBal’s experienced team of credentialed instructors is ready to provide the training you need to keep your organization safe and secure. The webinar is divided into 4 exercises. Please feel free to use the table of contents on the left side to move from exercise to exercise. Each exercise relates to a real life use of the exercise. Some of the exercises show how malfeasance is performed using an iPhone by someone with malicious intentions. Understanding where the iPhone and iPad are not secure allows for policies to make them more secure.
This webinar shows exercises that highlight the vulnerabilities of the iPhone. These exercises are not intended to be used in real world scenarios. The exercises are for ethical hacking purposes only to show where and how the iPhone is vulnerable. Security professionals tasked with defending data, armed with the knowledge of the vulnerabilities, can design security policies to keep the iPhone or iPad secure. It is not intended to be practiced by users - it is an example of where and how the iPhone can be compromised. It is then the responsibilities of the security professionals to write security policies to insure these vulnerabilities are prevented.
Posted: September 30 , 2011