Protecting Mobile Apps (Cars)

Download this episode

Download Video


Whenever new news comes out, it's imperative to analyze the actual attack vector and, if it's applicable to our environment, threat model. This analysis is the first step in avoiding hype and FUD. For this week's example? Android attacks on car mobile apps as presented at RSAC.





Available formats for this video:

Actual format may change based on video formats available and browser capability.

    The Discussion

    Comments closed

    Comments have been closed since this content was published more than 30 days ago, but if you'd like to send us feedback you can Contact Us.