Protecting Mobile Apps (Cars)

Sign in to queue

Description

Whenever new news comes out, it's imperative to analyze the actual attack vector and, if it's applicable to our environment, threat model. This analysis is the first step in avoiding hype and FUD. For this week's example? Android attacks on car mobile apps as presented at RSAC.

Tag:

Security

Embed

Download

Download this episode

The Discussion

Add Your 2 Cents