Think Like a Hacker! Common Techniques Used to Exploit Mobile Apps and How to Mitigate Them
The first step in learning how to protect your applications from hackers is to think like one. During this session, you'll learn how easy it is for hackers to leverage widely available tools to compromise mobile apps and get source code access, inject malware, steal sensitive data, and more. You'll hear about evolutions in mobile threat landscape and view demonstration of various reverse-engineering and tampering attacks, including the latest emerging threat vector: Cryptographic Key hacking.
Sam Rehman (@codemonkeysam)