SlideShare a Scribd company logo
Mobile Security
A Glimpse from the Trenches
Yair Amit
CTO & Co-Founder
Skycure
@YairAmit
!  Today
!  CTO & co-founder of Skycure
!  Previously
!  Managed the Application Security Group at IBM
!  Joined IBM through the acquisition of Watchfire
!  Loves and lives security
!  Filed over 15 security patents
About&Me&
A&Holis-c&Outlook&on&Mobile&Security&
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Biggest'Threat
Changing'Threat
Emerging'Threat
Basic'Threat
Malware&
The$Physical$Layer$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
!  Threat&vector&
!  Device'lost'/'device'stolen'/'temporary'physical'access
!  Basic&physical&security&needs:&
!  Remote'wipe
!  Locate'device
!  Backup
!  Local'storage
!  Passcode'protec@on
!  The&above&becomes&OS&responsibility&
!  MDM&provides&the&above&OS&features&together&with&
management&and&policy&enforcement&
The&Physical&Layer&
Network$Based$A6acks$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
Based on Skycure enabled devices worldwide
Real World Incident Statistics&
Affected Devices Over Time
0%&
10%&
20%&
30%&
40%&
50%&
0%&
23%&
30%&
35%&
41%&
1&Month&
2&Months&
3&Months&
4&Months&
!&
&
!  Did&network&aNacks&happen&near&your&office?&
!  Are&airports&more&suscep-ble&to&aNacks?&
!  Which&networks&at&a&conference&should&I&be&avoiding?&
Global&RealUTime&Threat&Map&&
hNps://maps.skycure.com&
$
$
Implementa;on<Based$Vulnerabili;es$
$
Vs.$
$
Design<Based$Vulnerabili;es$
Network&Based&ANacks&
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
Network$Based$A6acks$
$
Implementa-on&issues$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
$iOS$vs.$Android$
Implementa-onUBased&Vulnerabili-es&
!  Example&I:&
&
gotofail&
Implementa-onUBased&Vulnerabili-es&
>>'Read'more
Gotofail&–&The&Code&
static OSStatus

SSLVerifySignedServerKeyExchange(SSLContext *ctx, bool isRsa, SSLBuffer signedParams,
uint8_t *signature, UInt16 signatureLen) {
…
if ((err = SSLHashSHA1.update(&hashCtx, &clientRandom)) != 0)
goto fail;
if ((err = SSLHashSHA1.update(&hashCtx, &serverRandom)) != 0)
goto fail;
if ((err = SSLHashSHA1.update(&hashCtx, &signedParams)) != 0)
goto fail;
goto fail;
if ((err = SSLHashSHA1.final(&hashCtx, &hashOut)) != 0)
goto fail;
err = sslRawVerify(ctx,
ctx->peerPubKey,
dataToSign, /* plaintext */
dataToSignLen, /* plaintext length */
signature,
signatureLen);
…
fail:
SSLFreeBuffer(&signedHashes);
SSLFreeBuffer(&hashCtx);
return err;
}&
Always&goto&
“fail”,&even&if&
err==0&
Code&is&skipped&
(even&though&err&==&0)&
Func-on&returns&0&(i.e.&verified),&
even&though&sslRawVerify&was&
not&called&
!  Example&II:&
&
Heartbleed&
Implementa-onUBased&Vulnerabili-es&
>>'Read'more
Heartbleed&
Network$Based$A6acks$
$
Design&issues$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
!  Design&issues&are&much&more&interes-ng&
!  …'and'much'harder'to'fix
!  These&are&divided&into&two&types:&
!  General'“protocol”'vulnerabili@es
!  Design'issues'affec@ng'mobile'OS
!  Mobile&devices&are&more&suscep-ble:&
!  Classical'solu@ons'are'inadequate
!  Excessive'use'of'untrusted'networks
DesignUBased&Vulnerabili-es&
!  Example&I:&
&
&
sslstrip&
DesignUBased&Vulnerabili-es&(Generic)&
ANacker&removes&redirec;ons$
and&links&to&HTTPS&
Vic-m&con-nues&to&interact&via&HTTP&
instead&of&HTTPs&
Server&returns&a&redirec-on&to&
HTTPS&
>>'Read'more
!  Example&II:&
SSL&decryp-on&
DesignUBased&Vulnerabili-es&(Generic)&
92%'of'users'click'on'“Con@nue”
compromising'their'Exchange'iden@ty'
'(username'and'password)
Con@nue
92%
Cancel
8%
!  Example&III:&
Karma&
DesignUBased&Vulnerabili-es&(Generic)&
Hak5’s'WiFi'Pineapple
>>'Read'more
Network$Based$A6acks$
$
MobileUspecific&
design&issues$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
iOS sandbox approach
Source: Apple’s App Sandbox Design Guide
App Characteristics
$
!  One&Store&
!  Heavy&Screening&
!  App&Sandboxing&
Profile Characteristics
!  No&Store&
!  No&Screening&
!  No&Sandboxing&
iOS Security Model&
Where$Do$We$Find$Them?$
!  Mobile&Device&Management&(MDM)&
!  Cellular&carriers&
!  Usually'used'for'APN'sengs
!  Mobile&applica-ons&
!  Service&providers&
Configura-on&Profiles&
Configura;on$profiles$can$also$be$malicious$
!  Malicious&“service&providers”&(apps/services/WiUFis/etc.)&
!  Vulnerable&services&
!  Privacy&viola-ng&services&
Malicious&Profiles&
Click to install
streaming profile
Welcome to iOS
Streamer
Watch TV shows and
movies free online.
Stream your favorite
content directly to
your iOS device.
Hacker'gains'access'to'your'mail,'business'
apps,'cloud'services,'bank'accounts'and'
more,'even if traffic is encrypted
>>'Read'more
Going$Viral$
!  ANacker&hijacks&vic-m’s&key&iden--es&
!  Corporate'Exchange
!  Facebook
!  LinkedIn
!  ANacker&sends&mass&messages&to&vic-m’s&contacts,&luring&
them&to&install&the&malicious&profile&
!  ANack&propagates&
Malicious&Profiles&
!  Profile&lis-ng&could&indicate&suspicious&profiles&
!  CatUandUmouse&game:&aNackers&can&name&their&profile&to&look&
benign&
&
Am&I&Safe?&
!  Example&II:&
WiFiGate&
DesignUBased&Vulnerabili-es&(Mobile)&
>>'Read'more
App$Level$Security$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
!  Mobile&OS&enforce&addi-onal&security&models&
!  Sandbox
!  Be_er'updates
!  Controlled'applica@on'stores
!  AppUlevel&issues&are&now&on&the&rise&
App&Level&Security&&&Privacy&
App$Vulnerabili;es$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
!  Example&I:&
Plain&HTTP&
App&Level&Vulnerabili-es&
Daaa!&
!  Example&II:&
&
Cer-ficate&Pinning&
App&Level&Vulnerabili-es&
>>'Read'more
A$Long$Way$to$Go$
!  Almost&all&major&apps&today&lack&SSL&Pinning&
!  Suscep@ble'to'a_acks'such'as'malicious'profiles'by'design
!  Also'exploited'when'a_acker'gains'access'to'a'trusted'CA
!  Slow&adop-on&should&not&come&as&a&surprise&
!  Implementa@on'challenges
!  Less'flexibility
!  Can'become'a'nightmare'if'done'wrong…
Cer-ficate&Pinning&
!  Example&III:&
&
HTTP&Request&&&Hijacking&
App&Level&Vulnerabili-es&
Vic@m'interacts'with'the'
malicious'server
A'while'later,
vic@m'opens'the'app
App'logic'has'
changed!
A_acker'returns'a'301'
direc@ve'specifying'a'
permanent'change'in'URI
Victim opens the app in an
untrusted environment
App'con@nues'to'connect'
to'the'malicious'server!
Malicious'server'can'
return'actual'results'
from'the'target'server
>>'Read'more
HRH&–&ANack&Flow&
Malicious$Apps$
Physical&
Security&
Network&
Applica-on&
Security&&&
Privacy&
Malware&
The year of
Android
malware [1]
Google reveals
“Bouncer” - its
malware
scanner [2]
Malware is
moving out of
the Google
Play [3]
Google adds full-time
app scanning to address
malware on external
stores [4]
Google’s&Focus&on&Malware&
Android is becoming like iOS
when it comes to malware
!  While&OS&an-Umalware&techniques&advance,&there&are&other&
similar&problems&(harder&to&address)&
The&Maliciousness&Axis&
Malicious'
Apps
Ad'
Networks
Privacy'
Viola@ons
Not&an&Android&Only&Issue…&
Summary$
!  The&physical&threats&
!  Becomes'the'OS'responsibility
!  Network&based&threats&
!  Implementa@on'vulnerabili@es
!  Design'vulnerabili@es
!  Generic'vs.'mobile'specific
!  App&level&threats&
!  Vulnerabili@es
!  HTTP/S,'Cer@ficate'Pinning,'HTTP'Request'Hijacking
!  The'“maliciousness”'axis
!  Malware'!'Ad'Networks'!'Privacy'Viola@ons
Summary&
!  Personal level
!  Maintain'an'up'to'date'opera@nglsystem
!  Update'the'apps'that'you'are'using
!  Be'alerted'and'aware'of'evolving'threats
!  Network'layer
!  Thirdlparty'app'stores
!  OS'misconfigura@ons'and'vulnerabili@es
!  Organizational level&
!  Deploy'a'mobile'security'solu@on
Recommenda-ons&
Thank you!
!  Twi_er: 
@YairAmit
!  Email: 
yair@skycure.com
!  Blog: 
h_p://www.skycure.com/blog
Seamless Mobile Security

More Related Content

PDF
Getting Physical with Web Bluetooth - Uri Shaked, BlackBerry
Codemotion Tel Aviv
 
PDF
Can we build an Azure IoT controlled device in less than 40 minutes that cost...
Codemotion Tel Aviv
 
PDF
Intro to AWS IoT - Pop-up Loft London
Boaz Ziniman
 
PPTX
IoT security compliance checklist
GoWitek Consulting Pvt.Ltd
 
PDF
IoT Security: Problems, Challenges and Solutions
Liwei Ren任力偉
 
PPTX
Creator Ci40 IoT kit & Framework - scalable LWM2M IoT dev platform for business
Paul Evans
 
PDF
IoT Day 2019 Naples - Microsoft Azure Shpere
Mirco Vanini
 
PPTX
IoT Broker
FIWARE
 
Getting Physical with Web Bluetooth - Uri Shaked, BlackBerry
Codemotion Tel Aviv
 
Can we build an Azure IoT controlled device in less than 40 minutes that cost...
Codemotion Tel Aviv
 
Intro to AWS IoT - Pop-up Loft London
Boaz Ziniman
 
IoT security compliance checklist
GoWitek Consulting Pvt.Ltd
 
IoT Security: Problems, Challenges and Solutions
Liwei Ren任力偉
 
Creator Ci40 IoT kit & Framework - scalable LWM2M IoT dev platform for business
Paul Evans
 
IoT Day 2019 Naples - Microsoft Azure Shpere
Mirco Vanini
 
IoT Broker
FIWARE
 

What's hot (11)

PPTX
Trends in Cloud and Mobile Computing - Alain Azagury, IBM
Codemotion Tel Aviv
 
PDF
Successful Industrial IoT Patterns
WSO2
 
PPTX
Jamie Bowser - A Touch(ID) of iOS Security
centralohioissa
 
PPTX
Internet of Things and Azure - DevTeach 2016
Guy Barrette
 
PDF
Internet of Things: Patterns For Building Real World Applications
Ivan Dwyer
 
PPTX
Connecting IoT devices to Azure
Guy Barrette
 
PPTX
Azure IoT Hub
Shahriar Hossain
 
PPTX
Using an Open Source RESTful Backend for IoT Applications
Jan Liband
 
PPTX
Architecting IoT solutions with Microsoft Azure
Alon Fliess
 
PPTX
Building IoT solutions using Windows 10 IoT Core & Azure
Mostafa
 
PPTX
Gustavo Zastrow - Introduction to AWS IoT Core and MQTT
GustavoRuizZastrow
 
Trends in Cloud and Mobile Computing - Alain Azagury, IBM
Codemotion Tel Aviv
 
Successful Industrial IoT Patterns
WSO2
 
Jamie Bowser - A Touch(ID) of iOS Security
centralohioissa
 
Internet of Things and Azure - DevTeach 2016
Guy Barrette
 
Internet of Things: Patterns For Building Real World Applications
Ivan Dwyer
 
Connecting IoT devices to Azure
Guy Barrette
 
Azure IoT Hub
Shahriar Hossain
 
Using an Open Source RESTful Backend for IoT Applications
Jan Liband
 
Architecting IoT solutions with Microsoft Azure
Alon Fliess
 
Building IoT solutions using Windows 10 IoT Core & Azure
Mostafa
 
Gustavo Zastrow - Introduction to AWS IoT Core and MQTT
GustavoRuizZastrow
 
Ad

Viewers also liked (19)

DOC
Q&S Engineer
Rashed Shalash
 
PPT
українська література
InnaPashchenko
 
DOCX
mortgage and outreach resume
Kristy Barbier
 
PDF
Pushing JavaEE outside of the enterprise: Home Automation & IoT - David Delab...
Codemotion Tel Aviv
 
PDF
The M&T Story
Darren150
 
PPTX
Giaoandientuhoa10 32 hc_cooxicuaclo_caobaongoc
Gem Eden II
 
PDF
박홍근홈패션 사보 2014 봄호
phghome
 
PPSX
Flight Physiology
sh k
 
PDF
마마인하우스No17 web
phghome
 
PPTX
Irregular verbs.
Juan Diego Betanzos Valencia
 
PPT
Бизнес в интернете
Color-IT
 
PDF
Planning 10
Tiamat14
 
PPTX
Весна
gexarvest
 
PDF
Araldite Guia de selección de pastas de modelado Renpaste. Antala Industria (...
Antala Industria
 
PPT
Берёзе
gexarvest
 
PDF
Industry Background -Expertise- CRC-2016
Carl Citelli
 
PDF
Patio covers concrete
sierraoutdoor
 
Q&S Engineer
Rashed Shalash
 
українська література
InnaPashchenko
 
mortgage and outreach resume
Kristy Barbier
 
Pushing JavaEE outside of the enterprise: Home Automation & IoT - David Delab...
Codemotion Tel Aviv
 
The M&T Story
Darren150
 
Giaoandientuhoa10 32 hc_cooxicuaclo_caobaongoc
Gem Eden II
 
박홍근홈패션 사보 2014 봄호
phghome
 
Flight Physiology
sh k
 
마마인하우스No17 web
phghome
 
Бизнес в интернете
Color-IT
 
Planning 10
Tiamat14
 
Весна
gexarvest
 
Araldite Guia de selección de pastas de modelado Renpaste. Antala Industria (...
Antala Industria
 
Берёзе
gexarvest
 
Industry Background -Expertise- CRC-2016
Carl Citelli
 
Patio covers concrete
sierraoutdoor
 
Ad

Similar to Mobile Security Attacks: A Glimpse from the Trenches - Yair Amit, Skycure (20)

PDF
Cloud controls final2
Valencell, Inc.
 
PPT
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
ProductNation/iSPIRT
 
PDF
Debunking the Top 5 Myths About Mobile AppSec
NowSecure
 
PDF
Securing Mobile Apps: New Approaches for the BYOD World
Apperian
 
PPTX
Computing on the Move - Mobile Security
AVG Technologies AU
 
PDF
Security Best Practices for Mobile Development
Salesforce Developers
 
PDF
Securing Mobile & Online Identity in the Cyber World
Emil Tan
 
PDF
Secon_2017_Chemerkin_Yury_-_final_-_Clean.pdf
Yury Chemerkin
 
PDF
Безопасность данных мобильных приложений. Мифы и реальность.
Advanced monitoring
 
PDF
Building a Mobile App Pen Testing Blueprint
NowSecure
 
PPTX
Mobile security
dilipdubey5
 
PPTX
Cloud vs. On-Premises Security: Can you afford not to switch?
Zscaler
 
PPTX
IQT 2010 - The App Does That!?
Tyler Shields
 
PDF
DEF CON 23 - Sam Bowne - workshop android security auditing mobile apps
Felipe Prado
 
PPTX
i7 pregerine7 - Agentless byod security for Enterprises
i7Networks
 
PPTX
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Advanced monitoring
 
PDF
DefCamp_2018_Conference_Chemerkin_Yury_-_full_.pdf
Yury Chemerkin
 
PDF
DefCamp_2015_Conference_Chemerkin_Yury.pdf
Yury Chemerkin
 
PDF
UKLUG 2011 - iOS devices in the enterprise
René Winkelmeyer
 
PDF
Tips of Mobile Application Security
Marie Weaver
 
Cloud controls final2
Valencell, Inc.
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
ProductNation/iSPIRT
 
Debunking the Top 5 Myths About Mobile AppSec
NowSecure
 
Securing Mobile Apps: New Approaches for the BYOD World
Apperian
 
Computing on the Move - Mobile Security
AVG Technologies AU
 
Security Best Practices for Mobile Development
Salesforce Developers
 
Securing Mobile & Online Identity in the Cyber World
Emil Tan
 
Secon_2017_Chemerkin_Yury_-_final_-_Clean.pdf
Yury Chemerkin
 
Безопасность данных мобильных приложений. Мифы и реальность.
Advanced monitoring
 
Building a Mobile App Pen Testing Blueprint
NowSecure
 
Mobile security
dilipdubey5
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Zscaler
 
IQT 2010 - The App Does That!?
Tyler Shields
 
DEF CON 23 - Sam Bowne - workshop android security auditing mobile apps
Felipe Prado
 
i7 pregerine7 - Agentless byod security for Enterprises
i7Networks
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Advanced monitoring
 
DefCamp_2018_Conference_Chemerkin_Yury_-_full_.pdf
Yury Chemerkin
 
DefCamp_2015_Conference_Chemerkin_Yury.pdf
Yury Chemerkin
 
UKLUG 2011 - iOS devices in the enterprise
René Winkelmeyer
 
Tips of Mobile Application Security
Marie Weaver
 

More from Codemotion Tel Aviv (20)

PDF
Keynote: Trends in Modern Application Development - Gilly Dekel, IBM
Codemotion Tel Aviv
 
PDF
Angular is one fire(base)! - Shmuela Jacobs
Codemotion Tel Aviv
 
PDF
Demystifying docker networking black magic - Lorenzo Fontana, Kiratech
Codemotion Tel Aviv
 
PDF
Faster deep learning solutions from training to inference - Amitai Armon & Ni...
Codemotion Tel Aviv
 
PDF
Facts about multithreading that'll keep you up at night - Guy Bar on, Vonage
Codemotion Tel Aviv
 
PDF
Master the Art of the AST (and Take Control of Your JS!) - Yonatan Mevorach, ...
Codemotion Tel Aviv
 
PDF
Unleash the power of angular Reactive Forms - Nir Kaufman, 500Tech
Codemotion Tel Aviv
 
PDF
Actors and Microservices - Can two walk together? - Rotem Hermon, Gigya
Codemotion Tel Aviv
 
PDF
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
Codemotion Tel Aviv
 
PDF
My Minecraft Smart Home: Prototyping the internet of uncanny things - Sascha ...
Codemotion Tel Aviv
 
PDF
Distributed Systems explained (with NodeJS) - Bruno Bossola, JUG Torino
Codemotion Tel Aviv
 
PDF
Containerised ASP.NET Core apps with Kubernetes
Codemotion Tel Aviv
 
PDF
Fullstack DDD with ASP.NET Core and Anguar 2 - Ronald Harmsen, NForza
Codemotion Tel Aviv
 
PDF
The Art of Decomposing Monoliths - Kfir Bloch, Wix
Codemotion Tel Aviv
 
PDF
SOA Lessons Learnt (or Microservices done Better) - Sean Farmar, Particular S...
Codemotion Tel Aviv
 
PDF
S3, Cassandra or Outer Space? Dumping Time Series Data using Spark - Demi Ben...
Codemotion Tel Aviv
 
PDF
Web based virtual reality - Tanay Pant, Mozilla
Codemotion Tel Aviv
 
PDF
Material Design Demytified - Ran Nachmany, Google
Codemotion Tel Aviv
 
PDF
All the reasons for choosing react js that you didn't know about - Avi Marcus...
Codemotion Tel Aviv
 
PPTX
C10k and beyond - Uri Shamay, Akamai
Codemotion Tel Aviv
 
Keynote: Trends in Modern Application Development - Gilly Dekel, IBM
Codemotion Tel Aviv
 
Angular is one fire(base)! - Shmuela Jacobs
Codemotion Tel Aviv
 
Demystifying docker networking black magic - Lorenzo Fontana, Kiratech
Codemotion Tel Aviv
 
Faster deep learning solutions from training to inference - Amitai Armon & Ni...
Codemotion Tel Aviv
 
Facts about multithreading that'll keep you up at night - Guy Bar on, Vonage
Codemotion Tel Aviv
 
Master the Art of the AST (and Take Control of Your JS!) - Yonatan Mevorach, ...
Codemotion Tel Aviv
 
Unleash the power of angular Reactive Forms - Nir Kaufman, 500Tech
Codemotion Tel Aviv
 
Actors and Microservices - Can two walk together? - Rotem Hermon, Gigya
Codemotion Tel Aviv
 
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
Codemotion Tel Aviv
 
My Minecraft Smart Home: Prototyping the internet of uncanny things - Sascha ...
Codemotion Tel Aviv
 
Distributed Systems explained (with NodeJS) - Bruno Bossola, JUG Torino
Codemotion Tel Aviv
 
Containerised ASP.NET Core apps with Kubernetes
Codemotion Tel Aviv
 
Fullstack DDD with ASP.NET Core and Anguar 2 - Ronald Harmsen, NForza
Codemotion Tel Aviv
 
The Art of Decomposing Monoliths - Kfir Bloch, Wix
Codemotion Tel Aviv
 
SOA Lessons Learnt (or Microservices done Better) - Sean Farmar, Particular S...
Codemotion Tel Aviv
 
S3, Cassandra or Outer Space? Dumping Time Series Data using Spark - Demi Ben...
Codemotion Tel Aviv
 
Web based virtual reality - Tanay Pant, Mozilla
Codemotion Tel Aviv
 
Material Design Demytified - Ran Nachmany, Google
Codemotion Tel Aviv
 
All the reasons for choosing react js that you didn't know about - Avi Marcus...
Codemotion Tel Aviv
 
C10k and beyond - Uri Shamay, Akamai
Codemotion Tel Aviv
 

Recently uploaded (20)

PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
Beyond Automation: The Role of IoT Sensor Integration in Next-Gen Industries
Rejig Digital
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PPT
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PPTX
Coupa-Overview _Assumptions presentation
annapureddyn
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
This slide provides an overview Technology
mineshkharadi333
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Beyond Automation: The Role of IoT Sensor Integration in Next-Gen Industries
Rejig Digital
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Coupa-Overview _Assumptions presentation
annapureddyn
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
This slide provides an overview Technology
mineshkharadi333
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 

Mobile Security Attacks: A Glimpse from the Trenches - Yair Amit, Skycure