Unveiling the World of Mobile Exploitation: ARM Architecture and Beyond
Dinesh Shetty, Director, Security Engineering, Security Innovation
Mobile applications are the obvious target for cyber attacks, but a secure application won’t faze a committed cyber adversary. They can exploit any mobile interface—an app, calls to the OS, and background operations. From there, they can easily go after anything they want.