Network Forensics: Uncovering Secrets of Mobile Applications by Eric Fulton
Network and Device Level Mobile Security Controls by Scott Gordon
On the Internet, every action leaves a mark---in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. But what about mobile devices? What seemingly innocuous information are they sharing with, and without, your knowledge?
In this webcast, watch as Eric Fulton analyzes mobile network traffic and discover some interesting details about your favorite applications. You will see him locate GPS co-ordinates, identify installed mobile applications, and more.