Description: Smartphones are a hot new market for software developers. Millions of potential customers, and a large percentage willing to part with a small sum of money for your latest creation. Even a moderately successful app can help fill your pockets. It.s hard to ignore for legitimate developers. It.s even harder to ignore for criminals. Things have changed from the old days of malware creation. It.s no longer just about proving yourself or testing a new platform by writing proof-of-concepts(PoCs), porting old malware, and learning the idiosyncrasies of the development tools. Now it.s about evading detection and taking a profit. Where there.s money, crime usually follows. The presentation is not about attribution, naming names or pointing out the parties responsible. It.s about the underlying technology and the methods used, including: - how actual examples in the wild function - detection/analysis evasion techniques - geographical trends in profit-taking malware
Tags: securitytube , DerbyCon , Derby Con , hacking , hackers , information security , convention , computer security , Derby 11 , DerbyCon 11 , DerbyCon-2011 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.