{"id":81188,"date":"2020-09-03T17:42:05","date_gmt":"2020-09-03T09:42:05","guid":{"rendered":"https:\/\/www.i-sprint.com\/?p=81188"},"modified":"2022-03-10T17:43:00","modified_gmt":"2022-03-10T09:43:00","slug":"th-webinar-mobile-app-shielding-16sep20","status":"publish","type":"post","link":"https:\/\/www.i-sprint.com\/ja\/th-webinar-mobile-app-shielding-16sep20\/","title":{"rendered":"TH Webinar: Mobile Applications: Emerging threats, vulnerability and counter-measures"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-transform:none;\"><p><img decoding=\"async\" class=\"aligncenter wp-image-81192 size-full\" src=\"https:\/\/www.i-sprint.com\/wp-content\/uploads\/2022\/03\/16-Sep-2020-TH-Webinar-Info.png\" alt=\"\" width=\"905\" height=\"222\" srcset=\"https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2022\/03\/16-Sep-2020-TH-Webinar-Info-200x49.png 200w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2022\/03\/16-Sep-2020-TH-Webinar-Info-300x74.png 300w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2022\/03\/16-Sep-2020-TH-Webinar-Info-400x98.png 400w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2022\/03\/16-Sep-2020-TH-Webinar-Info-600x147.png 600w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2022\/03\/16-Sep-2020-TH-Webinar-Info-768x188.png 768w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2022\/03\/16-Sep-2020-TH-Webinar-Info-800x196.png 800w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2022\/03\/16-Sep-2020-TH-Webinar-Info.png 905w\" sizes=\"(max-width: 905px) 100vw, 905px\" loading=\"lazy\" \/><\/p>\n<\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-text-transform:none;\"><p>Mobile devices are becoming part and parcel of everyday life. Most of the time, if possible, a considerable number of online activities such as mobile banking, shopping, checking of sensitive information will be conducted on the mobile phone through apps. Even credential authentication has been tapping on mobile device capability. Recent years, we have come across various reporting on the vulnerability of mobile platforms, which resulted in attacks\/ stealing of credentials and data. Hence, it is important to look at mobile security.<\/p>\n<p>\u0e2d\u0e38\u0e1b\u0e01\u0e23\u0e13\u0e4c\u0e40\u0e04\u0e25\u0e37\u0e48\u0e2d\u0e19\u0e17\u0e35\u0e48\u0e01\u0e25\u0e32\u0e22\u0e40\u0e1b\u0e47\u0e19\u0e2a\u0e48\u0e27\u0e19\u0e2b\u0e19\u0e36\u0e48\u0e07\u0e02\u0e2d\u0e07\u0e0a\u0e35\u0e27\u0e34\u0e15\u0e1b\u0e23\u0e30\u0e08\u0e33\u0e27\u0e31\u0e19 \u0e42\u0e14\u0e22\u0e2a\u0e48\u0e27\u0e19\u0e43\u0e2b\u0e0d\u0e48\u0e16\u0e49\u0e32\u0e40\u0e1b\u0e47\u0e19\u0e44\u0e1b\u0e44\u0e14\u0e49\u0e01\u0e34\u0e08\u0e01\u0e23\u0e23\u0e21\u0e2d\u0e2d\u0e19\u0e44\u0e25\u0e19\u0e4c\u0e08\u0e33\u0e19\u0e27\u0e19\u0e21\u0e32\u0e01\u0e40\u0e0a\u0e48\u0e19\u0e1a\u0e23\u0e34\u0e01\u0e32\u0e23\u0e18\u0e19\u0e32\u0e04\u0e32\u0e23\u0e1a\u0e19\u0e21\u0e37\u0e2d\u0e16\u0e37\u0e2d\u0e01\u0e32\u0e23\u0e0b\u0e37\u0e49\u0e2d\u0e02\u0e2d\u0e07\u0e01\u0e32\u0e23\u0e15\u0e23\u0e27\u0e08\u0e2a\u0e2d\u0e1a\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25\u0e17\u0e35\u0e48\u0e25\u0e30\u0e40\u0e2d\u0e35\u0e22\u0e14\u0e2d\u0e48\u0e2d\u0e19\u0e08\u0e30\u0e14\u0e33\u0e40\u0e19\u0e34\u0e19\u0e01\u0e32\u0e23\u0e1a\u0e19\u0e42\u0e17\u0e23\u0e28\u0e31\u0e1e\u0e17\u0e4c\u0e21\u0e37\u0e2d\u0e16\u0e37\u0e2d\u0e1c\u0e48\u0e32\u0e19\u0e41\u0e2d\u0e1b \u0e41\u0e21\u0e49\u0e41\u0e15\u0e48\u0e01\u0e32\u0e23\u0e23\u0e31\u0e1a\u0e23\u0e2d\u0e07\u0e04\u0e27\u0e32\u0e21\u0e16\u0e39\u0e01\u0e15\u0e49\u0e2d\u0e07\u0e02\u0e2d\u0e07\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25\u0e23\u0e31\u0e1a\u0e23\u0e2d\u0e07\u0e01\u0e47\u0e16\u0e39\u0e01\u0e41\u0e15\u0e30\u0e1a\u0e19\u0e04\u0e27\u0e32\u0e21\u0e2a\u0e32\u0e21\u0e32\u0e23\u0e16\u0e02\u0e2d\u0e07\u0e2d\u0e38\u0e1b\u0e01\u0e23\u0e13\u0e4c\u0e40\u0e04\u0e25\u0e37\u0e48\u0e2d\u0e19\u0e17\u0e35\u0e48 \u0e44\u0e21\u0e48\u0e01\u0e35\u0e48\u0e1b\u0e35\u0e17\u0e35\u0e48\u0e1c\u0e48\u0e32\u0e19\u0e21\u0e32\u0e40\u0e23\u0e32\u0e1e\u0e1a\u0e01\u0e32\u0e23\u0e23\u0e32\u0e22\u0e07\u0e32\u0e19\u0e15\u0e48\u0e32\u0e07\u0e46\u0e40\u0e01\u0e35\u0e48\u0e22\u0e27\u0e01\u0e31\u0e1a\u0e0a\u0e48\u0e2d\u0e07\u0e42\u0e2b\u0e27\u0e48\u0e02\u0e2d\u0e07\u0e41\u0e1e\u0e25\u0e15\u0e1f\u0e2d\u0e23\u0e4c\u0e21\u0e21\u0e37\u0e2d\u0e16\u0e37\u0e2d\u0e0b\u0e36\u0e48\u0e07\u0e2a\u0e48\u0e07\u0e1c\u0e25\u0e43\u0e2b\u0e49\u0e21\u0e35\u0e01\u0e32\u0e23\u0e42\u0e08\u0e21\u0e15\u0e35 \/ \u0e02\u0e42\u0e21\u0e22\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25\u0e23\u0e31\u0e1a\u0e23\u0e2d\u0e07\u0e41\u0e25\u0e30\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25 \u0e14\u0e31\u0e07\u0e19\u0e31\u0e49\u0e19\u0e08\u0e36\u0e07\u0e40\u0e1b\u0e47\u0e19\u0e40\u0e23\u0e37\u0e48\u0e2d\u0e07\u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e17\u0e35\u0e48\u0e08\u0e30\u0e15\u0e49\u0e2d\u0e07\u0e1e\u0e34\u0e08\u0e32\u0e23\u0e13\u0e32\u0e16\u0e36\u0e07\u0e04\u0e27\u0e32\u0e21\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e02\u0e2d\u0e07\u0e2d\u0e38\u0e1b\u0e01\u0e23\u0e13\u0e4c\u0e40\u0e04\u0e25\u0e37\u0e48\u0e2d\u0e19\u0e17\u0e35\u0e48<\/p>\n<p>In this webinar, we will share with you on:<\/p>\n<ul>\n<li>Emerging trends and vulnerability on mobile applications<\/li>\n<li>Why does it matter to mobile app owners\/ developers<\/li>\n<li>How could you protect your business app or authentication against unsafe mobile device environment operation<\/li>\n<\/ul>\n<p>\u0e43\u0e19\u0e01\u0e32\u0e23\u0e2a\u0e31\u0e21\u0e21\u0e19\u0e32\u0e1c\u0e48\u0e32\u0e19\u0e40\u0e27\u0e47\u0e1a\u0e19\u0e35\u0e49\u0e40\u0e23\u0e32\u0e08\u0e30\u0e41\u0e1a\u0e48\u0e07\u0e1b\u0e31\u0e19\u0e01\u0e31\u0e1a\u0e04\u0e38\u0e13\u0e43\u0e19:<\/p>\n<ul>\n<li>\u0e41\u0e19\u0e27\u0e42\u0e19\u0e49\u0e21\u0e41\u0e25\u0e30\u0e0a\u0e48\u0e2d\u0e07\u0e42\u0e2b\u0e27\u0e48\u0e17\u0e35\u0e48\u0e40\u0e01\u0e34\u0e14\u0e02\u0e36\u0e49\u0e19\u0e43\u0e2b\u0e21\u0e48\u0e1a\u0e19\u0e41\u0e2d\u0e1b\u0e1e\u0e25\u0e34\u0e40\u0e04\u0e0a\u0e31\u0e19\u0e21\u0e37\u0e2d\u0e16\u0e37\u0e2d<\/li>\n<li>\u0e40\u0e2b\u0e15\u0e38\u0e43\u0e14\u0e08\u0e36\u0e07\u0e21\u0e35\u0e04\u0e27\u0e32\u0e21\u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e15\u0e48\u0e2d\u0e40\u0e08\u0e49\u0e32\u0e02\u0e2d\u0e07 \/ \u0e19\u0e31\u0e01\u0e1e\u0e31\u0e12\u0e19\u0e32\u0e41\u0e2d\u0e1b\u0e1a\u0e19\u0e2d\u0e38\u0e1b\u0e01\u0e23\u0e13\u0e4c\u0e40\u0e04\u0e25\u0e37\u0e48\u0e2d\u0e19\u0e17\u0e35\u0e48<\/li>\n<li>\u0e04\u0e38\u0e13\u0e08\u0e30\u0e1b\u0e01\u0e1b\u0e49\u0e2d\u0e07\u0e41\u0e2d\u0e1b\u0e18\u0e38\u0e23\u0e01\u0e34\u0e08\u0e2b\u0e23\u0e37\u0e2d\u0e01\u0e32\u0e23\u0e15\u0e23\u0e27\u0e08\u0e2a\u0e2d\u0e1a\u0e2a\u0e34\u0e17\u0e18\u0e34\u0e4c\u0e08\u0e32\u0e01\u0e01\u0e32\u0e23\u0e17\u0e33\u0e07\u0e32\u0e19\u0e43\u0e19\u0e2a\u0e20\u0e32\u0e1e\u0e41\u0e27\u0e14\u0e25\u0e49\u0e2d\u0e21\u0e02\u0e2d\u0e07\u0e2d\u0e38\u0e1b\u0e01\u0e23\u0e13\u0e4c\u0e40\u0e04\u0e25\u0e37\u0e48\u0e2d\u0e19\u0e17\u0e35\u0e48\u0e17\u0e35\u0e48\u0e44\u0e21\u0e48\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e44\u0e14\u0e49\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e44\u0e23<\/li>\n<\/ul>\n<p>Date: 16 September 2020<br \/>\nTime: 2.00pm to 3.30pm (TH Time)<\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;width:100%;\"><div class=\"fusion-separator-border sep-double\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#e0dede;border-top-width:1px;border-bottom-width:1px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In this webinar, we will share with you on:<br \/>\n\u2022\tEmerging trends and vulnerability on mobile applications<br \/>\n\u2022\tWhy does it matter to mobile app owners\/ developers<br \/>\n\u2022\tHow could you protect your business app or authentication against unsafe mobile device environment operation<\/p>\n","protected":false},"author":141,"featured_media":81200,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","footnotes":""},"categories":[169],"tags":[],"class_list":["post-81188","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events-ja"],"_links":{"self":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/81188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/comments?post=81188"}],"version-history":[{"count":3,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/81188\/revisions"}],"predecessor-version":[{"id":81201,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/81188\/revisions\/81201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/media\/81200"}],"wp:attachment":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/media?parent=81188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/categories?post=81188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/tags?post=81188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}