The OSINTion Tidbit

The OSINTion Tidbit

Share this post

The OSINTion Tidbit
The OSINTion Tidbit
Mobile Insecurity (with Georgia Weidman)
Copy link
Facebook
Email
Notes
More
User's avatar
Discover more from The OSINTion Tidbit
Open Source Intelligence (OSINT), Geospatial Intelligence (GEOINT), OPSEC/Privacy, Disinformation, and Data Science and the impacts they have on society.
Already have an account? Sign in

Mobile Insecurity (with Georgia Weidman)

Joe Gray's avatar
Joe Gray
Apr 26, 2016

Share this post

The OSINTion Tidbit
The OSINTion Tidbit
Mobile Insecurity (with Georgia Weidman)
Copy link
Facebook
Email
Notes
More
Share

Mobile Insecurity (with Georgia Weidman)

Advanced Persistent Security Podcast

Episode 11

Guest: Georgia Weidman

April 26, 2016

If you enjoy this podcast, be sure to give us a 5 Star Review and “Love Us” on iTunes; Like us on Google Play, Stitcher, Sound Cloud, Spreaker, and YouTube.

Mobile Insecurity Show Notes

Everyone wants to think about how secure they are. This podcast flips the script and assesses insecurity, specifically Mobile Insecurity. We discuss issues within the mobile computing ecosystem.

Part 1

Introductions and Current Event

Current Event: Apple Quick Time and why could it not have been Flash. Georgia’s dad still uses Microsoft XP and won’t connect his printer to the network.

Part 2

Georgia delivers her “Mobile Insecurity” talk and we discuss issues in the mobile threat landscape and possible mobile issues.

Mobile Malware, Ransomware, and MDM are discussed. Issues within the actual mobile Operating Systems are discussed briefly.

Joe asks if Georgia sees mobile devices distributing Ransomware and Malware to cars.

Part 3

Quick banter of Apple vs FBI and the implications of the precedent both attempted and actually set.

Part 4

Goodbyes and How to Contact Georgia

About Georgia:

Mobile Insecurity with Georgia Weidman
Georgia Weidman

Shevirah founder and CEO Georgia Weidman is a serial entrepreneur, penetration tester, security researcher, speaker, trainer, and author. She holds a MS in computer science as well as holding CISSP, CEH, and OSCP certifications. Her work in the field of smartphone exploitation has been featured internationally in print and on television. She has provided training at conferences such as Blackhat USA, Brucon, and CanSecWest. Georgia founded Bulb Security LLC, a security consulting firm specializing in security assessments/penetration testing, security training, and research/development. She was awarded a DARPA Cyber Fast Track grant to continue her work in mobile device security culminating in the release of the open source project the Smartphone Pentest Framework (SPF). She founded Shevirah Inc. to create product solutions for assessing and managing the risk of mobile devices in the enterprise and testing the effectiveness of enterprise mobility management solutions and is a graduate of the Mach37 cybersecurity accelerator. She is the author of Penetration Testing: A Hands-On Introduction to Hacking from No Starch Press. She was the recipient of the 2015 Women’s Society of CyberJutsu Pentest Ninja award. She is on the board of advisors of the angel backed security training startup Cybrary and the nonprofit Digital Citizens Alliance.

“There’s always going to be vulnerabilities” – Georgia Weidman

Contacting Georgia:

www.bulbsecurity.com

www.shevirah.com (Coming Soon)

Twitter: @georgiaweidman

Penetration Testing:A Hands On Introduction Hacking is her book

From the Publisher at https://www.nostarch.com/pentesting.

If you buy it directly from No Starch Press you get a discount with the code GEORGIA.

APS Blog Posts

MedStar Health Cybersecurity Fails to Prevent Attack

Adobe Patches Exploited Vulnerability

Ransomware Locks MBR

Iranian hackers hit with Federal charges

Spear Phishermen Target Corporate W-2 Data

Google Fixes Kernel Vulnerability

4 Things to Know About Ransomware

Ransomware Hits Mac Computers

IRS Targeted in Another Cyberattack

Thanks for stopping by and checking out our podcast. We would appreciate if you could subscribe (assuming you like what you hear; we think you will). This is meant to be informative and to provide value to anyone who listens – regardless of their knowledge and/or understanding of IT/Cybersecurity. To learn more about us, check out our “About Us” page.

If you have ANY Cybersecurity needs, please contact us and a member of our staff with promptly reply to your question or concern.

Enter your email address:

Delivered by FeedBurner

Subscribe to our mailing list

* indicates required

Email Address *

First Name

Last Name

The post Mobile Insecurity (with Georgia Weidman) first appeared on Advanced Persistent Security.


Subscribe to The OSINTion Tidbit

By Joe Gray · Launched 5 years ago
Open Source Intelligence (OSINT), Geospatial Intelligence (GEOINT), OPSEC/Privacy, Disinformation, and Data Science and the impacts they have on society.

Share this post

The OSINTion Tidbit
The OSINTion Tidbit
Mobile Insecurity (with Georgia Weidman)
Copy link
Facebook
Email
Notes
More
Share

Discussion about this post

User's avatar
OSINT Technique Spotlight: Google Dorking
It's not what you ask, but HOW you ask it
Nov 8, 2022 • 
Joe Gray
6

Share this post

The OSINTion Tidbit
The OSINTion Tidbit
OSINT Technique Spotlight: Google Dorking
Copy link
Facebook
Email
Notes
More
DuckDuckGo's Tracking Disabling and Disposable Email Services
Wolves in Sheep's Clothing?
Jul 22, 2021 • 
Joe Gray

Share this post

The OSINTion Tidbit
The OSINTion Tidbit
DuckDuckGo's Tracking Disabling and Disposable Email Services
Copy link
Facebook
Email
Notes
More
Browsers for Privacy, OPSEC, and OSINT
When doing an OSINT or OPSEC/Privacy investigation, not all browsers are created equal. Despite our best efforts at anonymity, they can…
Aug 22, 2020 • 
Joe Gray

Share this post

The OSINTion Tidbit
The OSINTion Tidbit
Browsers for Privacy, OPSEC, and OSINT
Copy link
Facebook
Email
Notes
More

Ready for more?

© 2025 The OSINion
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share

Copy link
Facebook
Email
Notes
More

Create your profile

User's avatar

Only paid subscribers can comment on this post

Already a paid subscriber? Sign in

Check your email

For your security, we need to re-authenticate you.

Click the link we sent to , or click here to sign in.