Mobile security, MWR Briefing june 2014, London

First impressions

On a sunny Thursday morning on the 5th of June 2014, we arrived at Tobacco Dock in London, via an early flight from the Netherlands.

Initially, it seemed like suit-and-tie event, regardlessly, it was a nice, relaxing atmosphere. Several friendly Men-In-Black types with walkie talkies were also present at the event, this is probably the standard procedure for security conferences, nonetheless I felt reassured that preparations were made to guarantee our physical security.
The attendees were a mixed bunch ranging from hardcore tech geeks to managerial types.

The Briefing

The first presentation started at 10am sharp, these were the presentations

  • Awareness-Driven Secure Development – A streamlined secure development lifecycle (SDLC) – presented by Donato Capitella
  • iOS Data Security – A look at how iOS apps can secure your data – presented by Andy Waugh
  • Software Defined Radios – Attacking wireless communications with low cost SDRs – presented by Jahmel Harris
  • Red Team: Live-fire Security Testing – From hacktivism to corporate espionage; advancing security assessments to meet the evolved attacker – presented by Stuart Passé (MWR), Marc Briggs & Peter Connolly (GHT Global)
  • Mobile Platform Comparison – A comparison of attacks against the four main mobile platforms and the security features available to mitigate them – presented by Henry Hoggard
  • Anomaly vs. Signature Based Attack – Helping defenders keep up with the ever changing attacker methodology – presented by Howard Marshall

IMG_20140605_110551

IMG_20140605_121905

IMG_20140605_163624

The presentations were very interesting. I was familiar with many of the topics that were discussed, but it was good to hear another perspective on them. Most sessions were an overview of a particular aspect of security. We will delve into some of these subjects in-depth later in our security-related blog posts. Software defined radio’s in particular were a topic that was interesting to hear about, given the proliferation of wireless add-ons and internet of things devices. The availability of low-cost hardware that can easily be programmed to intercept and manipulate radio signals (bluetooth, zigbee, Ant+) promises to be a real concern in the future. Bluetooth controlled pacemakers were an example of potentially serious consequences of radio exploits.

More about these topics later…..

Thanks to the MWR staff for a pleasant and well organised conference.

Links:

https://www.mwrinfosecurity.com/events/mwr/the-mwr-briefing-june-2014/

And for those interested in architecture…. the venue:

IMG_20140605_084135

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s