What Your Cellphone Looks Like to Hackers
This session explored ways in which cellphones are vulnerable to hackers and basic cyber hygiene methods to mitigate these attacks. The speaker explored cyber hygiene for cellphones, man-in-the-middle attacks, types of information on cellphones, and cybersecurity resources available to emergency communications centers (ECC). Man-in-the-middle attacks are those where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other. A piece of equipment called a WiFi Pineapple highlighted the ease of such attacks and symptoms to look for for these types of attacks.
Tags
APCO 2019