Skip to content

Emerging Threats for the Mobile Application

Photo of OWASP Indonesia
Hosted By
OWASP I. and ASyafaat
Emerging Threats for the Mobile Application

Details

Software yang tidak aman telah mengancam infrastruktur keuangan, kesehatan, pertahanan, energi, dan infrastruktur penting lainnya. Dengan semakin kompleks dan terhubungnya infrastruktur digital kita, kesulitan mencapai keamanan aplikasi meningkat secara eksponensial. Open Web Application Security Project (OWASP) yang merupakan komunitas terbuka yang didedikasikan untuk memungkinkan organisasi mengembangkan, membeli, dan memelihara aplikasi yang dapat dipercaya. Di OWASP sendiri, anda akan menemukan free and open…
• Tool dan standar keamanan aplikasi
• Buku tentang uji keamanan aplikasi, pengembangan kode aman, dan review kode keamanan
• Kendali keamanan dan pustaka standar
• Cabang lokal di seluruh dunia
• Riset terkini
• Konferensi lengkap di seluruh dunia
• Mailing list
• Dan banyak lagi … di www.owasp.org

Kali ini di OWASP Jakarta akan membahas :

  1. Emerging Threats for the Mobile Application

Abstract:
Vulnerability and Threats in the Era of Mobile Applications

Mobile app security involves safeguarding applications on mobile devices, such as smartphones and tablets, from a variety of security threats. As mobile apps become increasingly vital to both personal and business activities, ensuring their security is essential to protect sensitive data, maintain user privacy, and build trust. With the rapid growth of mobile usage, attackers are constantly finding new ways to exploit vulnerabilities in mobile applications.
In this session, we will delve into some of the most common and emerging methods used to attack mobile applications, including:
• Repackaging apps: Modifying legitimate apps to include malicious code and redistributing them.
• Hooking frameworks: Using tools to intercept and manipulate app behavior for malicious purposes.
• Mobile bots: Leveraging automated scripts to perform various malicious activities such as credential stuffing and spamming.
• Man-in-the-Middle (MitM) attacks: Intercepting communication between the app and the server to steal data or inject malicious content.
By understanding these threats and learning about best practices for mobile app security, you can better protect your applications and users from potential attacks.
Join us for this interactive session to gain valuable insights and practical knowledge on securing mobile apps effectively!

Speaker : Shahnawaz Backer / Senior Solutions Architect, Asia Pacific, China and Japan

Short Bio :
Shahn Backer is an ever inquisitive cyber security professional, who is intrigued by modern applications and its challenges. He has a keen interest in modern application security, digital identity, multi-cloud security and edge compute. He is currently a Senior Solutions Architects and focusses on application agility and security .

He frequently writes on IT security at f5labs.com and has co-authored a Redbook on access management deployment patterns. His works pivots on boosting security with visibility, intelligence, and automation. Shahn has designed identity systems for major financial institutions and government bodies and has released a gamified learning platform for Application Programming Interfaces security.

Linkedin : https://www.linkedin.com/in/backers

Topic:
supported by appsec.co.id also f5 networks indonesia

register via zoom :
https://f5networks.zoom.us/webinar/register/WN_A46TytnARaSxJTdWRWk6Qg#/registration

Photo of OWASP Jakarta Chapter group
OWASP Jakarta Chapter
See more events