[Article]-Hack First, Policy Second – A Mobile Device Story

This topic contains 1 reply, has 2 voices, and was last updated by  DragonGorge 5 years, 9 months ago.

  • Author
    Posts
  • #8567
     Don Donzal 
    Keymaster

    This is a blog post. To read the original post, please click here »

    Like many of you I was extremely excited when my organization started allowing purchases of iPhones and Android devices. With the entire buzz around “the consumerization of IT” and “Bring Your Own Device (BYOD),” it wasn’t long before these devices started becoming a necessity for business rather than simply the coolest new gadget. Syncing my email and calendar was a great first start, although I have to admit the electronic leash has become quite long in the past few years. When I was able to make travel reservations, submit expense reports, attend internal web conferences, review Statements of Work (SoW) and presentations all without opening my laptop, I became a huge fan. Policy never came to mind much less a hack first mentality.

    If you’ve read any of my previous articles, then you will realize I come from a hacking background first and foremost. Therefore, when I began to delve into mobile security, I didn’t start with learning best practices or how to develop secure mobile applications. And a corporate policy was definitely the last thing on my mind. I simply wanted to start breaking things. However, as it wouldn’t do to brick a corporate device, I explored the possibility of purchasing an iPhone/iPad/iPod without a data plan to use as a hardware testing platform. This was not only a stroke of genius for learning mobile application security, but it led to this article. So let’s look at a practical business decision, but, from the get-go, approach it as a hacking exercise.

  • #53457
     DragonGorge 
    Participant

    Great article. Good to know if one of my family members ever loses their phone – time to change my router’s password.

    BTW – I noticed the screenshot says “Kali Linux” but the picture suggests it’s actually a Backtrack machine. I suppose it’s possible that someone would put a BT wallpaper on Kali. 😉

You must be logged in to reply to this topic.

Copyright ©2019 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?