Mobile Security Kampung | SINCON 2025
- SIN | Infosec In the City
- Mar 29
- 2 min read
As mobile becomes the dominant channel for finance, public services, and digital identity in Southeast Asia, attackers are shifting their focus accordingly. From malware and fake apps to eKYC bypass and device farms, the threat landscape is evolving fast, and defenders must adapt just as quickly. This Kampung provides a practical deep dive into mobile app security through hands-on exploration of both offensive tactics and defensive strategies. Supported by a cybersecurity team with deep real-world experience defending critical mobile applications, this Kampung bridges the gap between attacker techniques and effective mobile protection.
What to Expect?
Participants will gain actionable, technical experience in identifying and mitigating mobile threats, including:
Real-world attack scenarios: Reverse engineer and manipulate a vulnerable demo app to uncover typical flaws.
Defensive techniques: Learn how to counteract common attacks using practical tools and layered security approaches.
Threat visibility: Understand how runtime insights and telemetry can support early detection and response.
Peer learning: Bring your own mobile security challenges and discuss solutions with fellow practitioners and instructors.
Whether you're building, testing, or defending mobile apps, this Kampung will help sharpen your edge.
Agenda
Introduction
Contextualise the importance of mobile security across sectors like finance, public services, and gaming.
Walk through real-world mobile threats seen across the region.
Live Demo: Attacking a Mobile App
Explore a purpose-built vulnerable app.
Use basic tools to reverse engineer, tamper, and extract data.
Understand attacker logic and tactics.
Hands-on: Defending Against Attacks
Apply mobile security protections in real-time.
Retry attacks to compare before/after outcomes.
Discuss practical tradeoffs and implementation tips.
Case Studies
Review examples from the field and optionally examine apps or challenges brought by participants.
Discussion & Q&A
Share lessons learned, exchange techniques, and ask questions tailored to your environment.
Setup Requirements for Participants
Bring along your laptop to engage in the hands-on activities.
Commenti