Technical Program Manager APCO International Daytona Beach, Florida
Imagine if a stranger had free access to, and total control of, your mobile device. All of your personal information, including contacts, emails, payment info, and passwords are exposed. That private information is the pot of gold that cybercriminals are always on the hunt for. There could be impacts to your ECC should cell phone be allowed to charge via USBs in computers or connect to ECC WiFi. This session will examine techniques to protect cellphone data and mitigation techniques for ECCs to protect themselves.
Learning Objectives:
Examine common techniques that hackers use to exploit cellphones.
Explain the resources available to an ECC should an exploited phone be connected to the network.