Tripwire Security Researcher to Present Android and Google Apps Attack Vectors at DEF CON 21

July 30, 2013

Session to identify best practices to minimize risk and guidelines for recovering from Google Apps security incidents.

Portland, Oregon (PRWEB) July 30, 2013

Tripwire Inc, a leading global provider of IT security solutions, today announced that Craig Young, computer security researcher with Tripwire's Vulnerability and Exposures Research Team (VERT), will present at DEF CON 21. The event takes place August 1-4, 2013 at the Rio Hotel and Casino in Las Vegas, Nevada.

Millions of businesses worldwide trust Google Apps to run their organization's domain. The life-blood of these organizations is routinely stored in Google accounts and accessed with mobile devices. During this presentation, Young will discuss how an adversary can parlay the compromise of a single Android device into a complete Google Apps domain takeover, provide insight into Google’s Play Store Bouncer, and review Android malware analysis at the end-point. He will also identify best practices to minimize risk and discuss guidelines for recovering from a Google Apps security incident.

Session specifics include:

TITLE: Android Web Login: Google's Skeleton Key


DATE: Saturday, August 3, 2013

TIME: 1:00 p.m.-1:20 p.m. PDT

For more about DEF CON 21, please visit: https://www.defcon.org/html/defcon-21/dc-21-schedule.html.

About Tripwire, Inc.

Tripwire is a leading global provider of risk-based security and compliance management solutions, enabling enterprises, government agencies and service providers to effectively connect security to their business. Tripwire provides the broadest set of foundational security controls including security configuration management, vulnerability management, file integrity monitoring, log and event management. Tripwire solutions deliver unprecedented visibility, business context and security business intelligence allowing extended enterprises to protect sensitive data from breaches, vulnerabilities, and threats. Learn more at http://www.tripwire.com or follow us @TripwireInc on Twitter.

For the original version on PRWeb visit: http://www.prweb.com/releases/2013/7/prweb10976523.htm

Source: prweb

comments powered by Disqus