From the course: CertNexus Cyber Secure Coder (CSC-110) Cert Prep
Unlock this course with a free trial
Join today to access over 24,700 courses taught by industry experts.
Mobile application vulnerabilities deep dive
From the course: CertNexus Cyber Secure Coder (CSC-110) Cert Prep
Mobile application vulnerabilities deep dive
- In this episode of Cyber Secure Coder we are going to take a closer look at mobile device vulnerabilities, coming up next on "ITProTV." - [Narrator] You're watching "ITProTV." (upbeat music) - Welcome back, everyone, ITProTV. Today, we are looking deeper into, well, those mobile devices that we carry around in our pockets, seeing the vulnerabilities that lie within theirs. We already taken a look at web application vulnerabilities, moving the ball down the street, with our boy here, Justin Dennison, Justin, welcome back. Where did we begin with mobile? - Oh, I was like, "Yeah, those tracking devices you carry around." (Daniel chuckles) - That's right. The little spy. (chuckles) - Yeah, the little spy. Actually, that makes it worse. If we have vulnerabilities, if people go, "Oh, well, let me turn on the camera. Let me turn on the microphone. Oh, (crosstalk) smile. GPS transponder and phone home." That's no…
Contents
-
-
-
-
-
-
Guidelines for secure coding14m 16s
-
(Locked)
Buffer overflows and prevention13m 8s
-
(Locked)
Race conditions10m 9s
-
(Locked)
Challenge: Use locks to remediate race condition5m 54s
-
(Locked)
Solution: Use locks to remediate race condition8m 52s
-
(Locked)
OWASP top ten platform vulnerabilities10m 28s
-
(Locked)
Web application vulnerabilities deep dive16m 50s
-
(Locked)
Mobile application vulnerabilities deep dive16m 17s
-
(Locked)
IoT vulnerabilities deep dive19m
-
(Locked)
Desktop vulnerabilities deep dive13m 37s
-
(Locked)
Privacy vulnerability defects20m 41s
-
-
-