- September 17, 2015
- (Local time)
Have you ever wondered how to get access to the crucial data stored on a Fortune 2000 CEO’s mobile phone and rule the world? Today, we are witnessing an unprecedented number of mobile devices being integrated into the core business processes of companies and being actively accessed by top executives to manage them remotely. Another aspect is the level of access: even if mobile access for a typical middle-level employee is restricted or limited, CEO’s can do everything!
The vulnerabilities in SAP Afaria were to be presented at the BlackHat APAC security conference in March, but the presentation was revoked in accordance with SAP’s Disclosure Guidelines.