Description: Synopsis: Attackers are starting to move on from simple attacks, mainly because users are starting to figure out that the free adult entertainment or chat app shouldn't be sending SMS messages to expensive numbers. They're leveraging techniques from PC malware like server-side polymorphism, vulnerability exploits, botnets and network updates, and preemptive/direct attacks against security software.
It's not all that bad. Attackers aren't going out of their way to discover their own vulnerabilities or writing their own exploits. They're happy to repurpose the work done by legitimate developers, security researchers and the rooting community.
If the malware has gotten trickier, what are those tricks? We'll look at portions of code (bytecode/decompiled Java source & disassemblies) from in the wild mobile malware and show how earlier research is adapted by attackers.
For more information, please visit : - http://grrcon.org/
Tags: securitytube , hacking , hackers , information security , convention , computer security , grrcon-2012 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.