addressalign-toparrow-leftarrow-rightbackbellblockcalendarcameraccwcheckchevron-downchevron-leftchevron-rightchevron-small-downchevron-small-leftchevron-small-rightchevron-small-upchevron-upcircle-with-checkcircle-with-crosscircle-with-pluscrossdots-three-verticaleditemptyheartexporteye-with-lineeyefacebookfolderfullheartglobegmailgooglegroupsimageimagesinstagramlinklocation-pinm-swarmSearchmailmessagesminusmoremuplabelShape 3 + Rectangle 1outlookpersonJoin Group on CardStartprice-ribbonImported LayersImported LayersImported Layersshieldstartickettrashtriangle-downtriangle-uptwitteruseryahoo

Corporate Espionage via a Compromised Mobile Device

With its extensive connectivity and extreme portability, the fine gentlemen from viaForensics will demonstrate how a smartphone can easily be turned into the perfect espionage tool, bypassing an organizations perimeter and desktop security solutions. Through the download of an application requesting excessive permissions, they will demonstrate how a hacker can take complete control of the victim’s phone, without leaving an evidence trail of malicious activities. We will also demonstrate how the phone can be morphed into a remote keyboard, bypass desktop security and give a hacker “hands-on” access to the victims PC when the phone is connected via USB.


Jon Porter:
Jon Porter is a Mobile Security Analyst for viaForensics. His responsibilities include assessing mobile applications for security vulnerabilities, handling support cases on multiple software solutions, acting as a technical liaison for the customer experience, and has assisted in multiple presentations throughout the Chicagoland area. Jon is currently enrolled in DePaul University pursuing a Master’s Degree in Computer, Information, and Network Security.

James Drake:
James M Drake is a Mobile Security Analyst at viaForensics. His responsibilities include research and development of mobile vulnerabilities and exploits, JTAG Forensics, and presentations throughout the Chicagoland area. James is currently enrolled at IIT pursuing a Master’s Degree in Cyber Forensics and Security.

Bob Hanson:
Bob Hanson is responsible for the Central Region and all sales outside North America. With over 15 years sales experience, Bob has developed domestic and international markets for U.S. Robotics / 3Com, Check Point Software Technologies, Brightmail and other start-ups.

Join or login to comment.

  • Gratiela Monica M.

    I just found the announcement about this past meeting on I would be interested to learn more about why using the ACCESS_WIFI_STATE and INTERNET permissions together would allow a hacker to track the victim's habits (the victim is supposed to use an Android application, e.g. a mobile POS application.) Unfortunately I live now in Foster City, CA so I could not participate in future meetings of the group.

    September 7, 2014

  • nicolai s.

    I think the group of individuals in this group are world class I really enjoyed the Q and A with the presenters and the hosts, i look forward to the future meetups with this group.

    May 28, 2013

  • nicolai s.

    The guys in this group were impressive and knowledgeable

    May 17, 2013

  • Lani

    Great event! Interactive, interesting and fun!

    May 17, 2013

  • Bob C.

    I was looking forward to coming but am sick. Will the slides or video be posted for this?

    1 · May 16, 2013

    • Ryan B.

      Will try

      2 · May 16, 2013

    • Ryan B.

      To those looking for the slides: We should have something up soon but the fascinating part of the presentation was the demo which, unfortunately, we are unable to post.

      May 17, 2013

  • Ryan B.

    Awesome presentation

    May 17, 2013

  • J.M. D.

    Also I'd like to give a shoutout to the dev team that wrote and developed the exploits in the demo we showed:

    David Weinstein - @insitusec


    Marco Grassi - @marcograss

    Tweet these brilliant guys with any questions you may have regarding the low level technical details of any part of the demo, or just send them words of praise for coming up with such genial attacks against mobile platforms.

    May 16, 2013

  • J.M. D.

    Hi all,
    Thank you for coming to see our demo.
    Per request, here is our contact info:

    James M Drake

    Jon Porter

    1 · May 16, 2013

  • nicolai s.

    This is gonna be awesome

    1 · May 16, 2013

44 went

Our Sponsors

  • Workbridge

    Free beer and pizza and a place to meet in The Loop

People in this
Meetup are also in:

Sign up

Meetup members, Log in

By clicking "Sign up" or "Sign up using Facebook", you confirm that you accept our Terms of Service & Privacy Policy