From Live-Tech. Here’s the list but read the rest for more details.
- Google Glass for snatching passwords
- Attack against the virtual desktops
- Abusing Microsoft Kerberos
- Remote car network attacks
- Data theft from point-of-sale devices
- USB Stick malware
- Mobile carrier’s control code
- Free cloud service trials to inject Botnets
- Mobile device management software
- Attacks against realistic cryptographic constructions
You must be logged in to post a comment.