Weaknesses in secure mobile data stores |
One method, frequently referred to as a secure container, uses an encrypted data store to protect the business information on the device from malware or an unauthorized user. Yet, such precautions are not enough, says Michael Shaulov, CEO of Israeli startup Lacoon Mobile Security, which will show off ways to circumvent the protection of secure containers this month at Black Hat USA in Las Vegas.
Any malware or user that has access to the operating system will be able to undermine the integrity of the encryption used for most, if not all, secure containers included as part of a mobile device management (MDM) solution, Shaulov says.ng those untrusted mobile environments.
Any malware or user that has access to the operating system will be able to undermine the integrity of the encryption used for most, if not all, secure containers included as part of a mobile device management (MDM) solution, Shaulov says.ng those untrusted mobile environments.
Weaknesses In Secure Mobile Data Stores | The Dark Reading
No comments:
Post a Comment