Hardware

Stay current with the components, peripherals and physical parts that constitute your IT department.

  • Webcasts // Apr 2015

    Hardware Level Attacks

    A running computer program is not a mathematical abstraction, but a physical process taking place somewhere in the real world. This makes all programs and the devices they run on vulnerable to a variety of physical attacks that are often overlooked or dismissed as impractical.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    The Inception Framework: An APT Campaign in the Cloud, Mobile, and Embedded Systems

    Many of the indicators falsified by these attackers have been used as trusted information when attributing other know threats which should call into question the legitimacy of such claims. This webcast will walk through the discovery and processes they used to peel back the layers behind this sophisticated framework.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Bad USB Weaponized

    Explore the world of bad USB. How to build, deploy, and optimize the bad USB platform? Command and control structure. Hijinks with bad USB will include results achieved during deployment, systems owned, shells acquired, data acquired and coupling with social engineering and security awareness and training.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    My 4G WiFi Modem Sucks

    In this webcast, the presenter will essentially cover the techniques and tools used to find and exploit a number of vulnerabilities on the Telstra ZTE MF91 4G WiFi modem. Exploits include authentication bypass, recovery of credentials, and modification of core functionality, unexpected (and insecure) device behavior and unauthenticated factory reset.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Breaking Mobile Social Networks for Automated User Location Tracking

    Location-Based Social Networks (LBSNs) feature location-based friend discovery services attracting hundreds of millions of active users world-wide. While leading LBSN providers claim the well-protection of their users' location privacy, in this webcast, the presenter will show for the first time through real world attacks that these claims do not hold...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Network Attached Shell: N.A.S.ty Systems That Store Network Accessible Shells

    In this webcast, the presenter focus on "How to", and the implications of compromising network based storage systems, but will conclude that the absence of security in not only storage hardware, but networking hardware in general, has left data unprotected and millions of networks vulnerable to exploitation.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Don't Trust Your USB! How to Find Bugs in USB Device Drivers

    The Universal Serial Bus (USB) has become the standard interface for interconnecting computers with peripheral hardware today. USB is used to access Human Interface Devices (HIDs) like keyboards and mice, storage devices like USB flash sticks or external harddrives but also webcams, soundcards, Network Interface Cards (NICs), wireless cards, Bluetooth...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Gyrophone: Recognizing Speech From Gyroscope Signals

    In this webcast, the presenters will show that the gyroscopes found on most Smartphones are sensitive to measure acoustic signals in the vicinity of the phone. Since iOS and Android require no special permissions to access the gyro, their research shows that apps and active websites that cannot access the...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Hack Your ATM With Friend's Raspberry.py

    At all times there have been bad guys, who tried to steal money. ATM machines containing vast amounts of money have always been attractive targets. Until recently, criminals were only using physical weaknesses. Skimmers and shimmers for stealing magstripe-tracking data, fake pin pads and cameras for stealing pin codes, and...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Hacking Before Computers

    Before integrated circuits, digital circuits have been made with discrete transistors and the presenter "Invented" a flip-flop, not knowing that he is already exist. The first project with the Z80 (which the presenter still keeping and can show it), when the presenter did not have a computer so assembled a...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Webcast: You Don't Know What You Don't Know! New Insights for Driving Cloud Strategy Through Analyzing Existing Behavior

    You can’t manage what you can’t measure and most of us find it difficult to formulate a strong cloud policy to complement what we’ve been doing in-house because it’s difficult to understand how good we are at managing our existing technologies. In this webinar we’ll explore the world of cloud...

    Provided By Hewlett-Packard (HP)

  • Webcasts // Mar 2015

    Mobile Forensics: MPE+ Android Malware Detection

    Malware on computers can infect, transmit and "Sell" personal data. Malware can also be used to "Blame" and cast doubt on collected evidence in a computer examination. If this is the case, why aren't these items being scanned when conducting a mobile device exam? In this webcast, the presenter will...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Trashing USB Layers Using the Facedancer Board

    A bottle of Laphroaig 18 later, they came to the conclusion that while libUSB and python-USB make it easy to prototype USB host-side applications, there wasn't really anything handy for prototyping device-side applications. So the next afternoon, they wired a MAX3421 EVK into the GoodFET41.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    iPhone Raw NAND Forensics and Recovery

    With the introduction of the 3Gs and iOS4 Apple introduced a highly advanced data protection scheme based on state of the art encryption and tight integration with the crypto-enabled hardware in the iPhone. The Apple data protection scheme introduced with iOS4 has effectively shut the door for data recovery on...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Java's SSLSocket: How Bad APIs Compromise Security

    In this webcast, the presenter will explain about the implementation of SSL sockets in Java: internet security is hard, TLS is almost impossible and implementing TLS correctly in Java is "Nightmare!". This webcast will show how a badly designed security API introduced over 15 years ago, combined with misleading documentation...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Hard Drive Punch: Destroying Data as a Performative Act

    In general data is stored on technically sensitive systems and can easily be lost. At the same time files today appear often as indestructible once uploaded to the Internet. In this webcast, the presenter will explain about a variety of approaches on data destruction and how these connect to current...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Uncaging Microchips - Techniques for Chip Preparation

    An entertaining, thrilling and educational journey through the world of chip preparation. Deep insight into amateur-as well as professional methods and equipment is given, for the first, most important steps for analysis and attacks on dedicated hardware.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Towards General Purpose Reconfigurable Computing on Novena - FPGAs for Everybody with Novena

    The Novena open source laptop contains a FPGA, but free software support for FPGAs is lacking and requires root access to the hardware. The presenters' work is on providing a framework and a demonstration application for general purpose accelerator cores for Novena's FPGA.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Hardware Reverse-Engineering Tools New Threats - New Opportunities

    More recently, such forms of analysis have been obsoleted by advanced invasive analysis techniques that utilize capital-intensive failure analysis equipment and require extensive technical skills. One such technique, laser glitching, has recently been included into common criteria evaluations. The transient faults produced by laser glitching are similar in nature to...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Teridian SoC Exploitation: Exploration of Harvard Architecture Smart Grid Systems

    The Teridian system-on-a-chip platform wraps a complete system around a modified 8051 core, with additional features for chip security to block debug functionality and external access to memory. Additionally, the Harvard architecture design sets relatively rigid barriers between code and data (as opposed to x86/64), which presents an unintentional security...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Synthetic Data Generation and Defense in Depth Measurement of Web Applications

    In this webcast, the presenter will explain quickly cover architecture and system overviews, then dive into exploitation scenarios with techniques to attack Harvard architecture systems and code security implementations. End state results include pathways to gain coveted binary images of firmware and resident code execution.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Mobile: Unwrapping the Truth Analysis of Mobile Application Wrapping Solutions

    One of the latest trends of BYOD solutions is to employ "Mobile Application Management (MAM)", which allows organizations to wrap existing applications to perform policy enforcement and data/transport security at the application layer rather than at the device level.

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    More Shadow Walker the Progression of TLB Splitting on X86

    In this webcast, the presenter will cover the concept of Translation Lookaside Buffer (TLB) splitting for code hiding and how the evolution of the Intel x86 architecture has rendered previous techniques obsolete and new techniques to perform TLB-splitting on modern hardware.

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Single Chip Microcontrollers: Beyond Arduino

    The world of Arduino has introduced many to the world of embedded controls. What does the world of commercial single chip microcontroller development look like? Are the users ready to move beyond Arduino? Come learn how the "Pros" do single chip embedded development and easy ways they can take their...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    2FF: Two Factor Failure

    Two Factor Authentication (2FA) systems are required by security standards and help to solve the many weaknesses of password authentication, and are increasingly found both in enterprise systems and in general web applications. Unfortunately, many 2FA systems have vulnerabilities - some glaring, some more subtle - and 2FA systems have...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Embedded Linux Device Drivers

    Purpose-built operating systems based on the Linux kernel are widely used in embedded system applications such as consumer electronics, networking equipment and industrial automation. Hardware for embedded systems is different from hardware for classical PC systems. While the general rules for Linux device drivers programming still apply, the hardware specifics...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Absolute Backdoor Revisited

    In this webcast, the presenter will includes a live demonstration of security flaws in modern anti-theft technologies that reside in firmware and PC BIOS of most popular laptops and some desktop computers. While the general idea behind anti-theft technology is good, improper implementation can render it useless as well as...

    Provided By SecurityTube.net

  • Webcasts // Jul 2014

    Citrix App Orchestration 2.5 Overview

    Citrix App Orchestration accelerates and automates the delivery of Desktops-as-a-Service (DaaS). It is built on proven Citrix best practices; App Orchestration helps service providers design and implement a secure, multi-tenant, multi-domain and multi-location based environment.

    Provided By Citrix Systems

  • Webcasts // Jul 2014

    Overview of the Citrix Client Virtualization Solution

    In this webcast, the presenter explains about how the Citrix client virtualization solution and Intel Core processors that helps the organization to manage and secure Windows and Mac devices. The client virtualization solution includes both XenClient and DesktopPlayer.

    Provided By Citrix Systems

  • Webcasts // Jun 2014

    Extend the Benefits of VMware Horizon 6 with Liquidware Labs

    VMware Horizon 6 provides more options than ever to deliver workspaces to the users tailored to their needs and requirements. In this webcast, the presenter will explain about the benefits of VMware Horizon 6. The presenter will also cover how the user can use their solutions and established methodology of...

    Provided By DABCC

  • Webcasts // Jun 2014

    Google Hangout: HP and Intel - The Midsized Challenge - IT Strategies for Today's Medium Sized Businesses

    Do today’s IT solutions only focus on large enterprises and ignore small and midsize businesses? Small businesses often rely on personal productivity solutions and off-the shelf accounting software. Large businesses have teams of IT staff focused on apps, infrastructure and security. Unfortunately, many midsized businesses have outgrown their original technology...

    Provided By Hewlett-Packard & Intel®

  • Webcasts // May 2014

    On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

    Provided By Centrify

  • Webcasts // Apr 2014

    Efficient Data Management Methodologies for the Modern Data Center

    Enterprise information technology is at a crossroads. Cloud computing is overhauling the way IT is built, used and delivered to your customers. Big Data is overwhelming legacy infrastructures, compounding an already untenable management challenge. And mobility is changing everything about how data is accessed and used. Forward-thinking companies realize that...

    Provided By CommVault Systems

  • Webcasts // Apr 2014

    XenDesktop Cloud Provisioning with CloudPlatform

    In this webcast, the presenter will explain about the Cloud Provisioning with CloudPlatform and integrated desktop cloud solution to streamline management, improve scalability and increase operational efficiency for the user XenDesktop or XenApp environments.

    Provided By Citrix Systems

  • Webcasts // Apr 2014

    The Collaboration System that Brings Teams Together

    Sharing knowledge, developing ideas, making better decisions – these move agencies and teams in the right direction. With Christie Brio, you can simultaneously contribute rich multimedia content from multiple wireless sources and engage easily with colleagues – in the same room or around the world, in real-time. Learn about Christie...

    Provided By AVI-SPL

  • Webcasts // Mar 2014

    Citrix - The Complete Solution for Service Providers in the Cloud Desktop Market

    Citrix offers the complete solution for service providers in the cloud desktop market. The user will learn why the Citrix believes \"DaaS\" is really about packaging a portfolio of end-user hosted services. Understand the experience of more than 2,600 Citrix Service Provider partners, from major telcos to small firms, who...

    Provided By DABCC

  • Webcasts // Mar 2014

    Citrix DaaS - A High-Growth Hosted Business Opportunity for Service Providers

    Citrix Service Provider (CSP) partners have four unique opportunities to create a high-value, high-growth DaaS business. The four unique opportunities are: the opportunity to develop a profitable hosted business with complete technical, business and marketing resources, the opportunity to differentiate and focus with vertical advice and specialized offerings, opportunities beyond...

    Provided By Citrix Systems

  • Webcasts // Feb 2014

    VMware & Google: Windows Desktops & Apps as a Cloud Service on Chromebooks

    Google and VMware are working together to modernize corporate desktops for the mobile cloud era by providing businesses with secure, cloud access to Windows applications, data and desktops on Google Chromebooks.

    Provided By DABCC

  • Webcasts // Feb 2014

    Answering the Tough Question: Who Has Access to What?

    Learn from this webcast how to select specific users or groups in Active Directory (AD) and efficiently assess and document permission assignments within your environment, as well as how automating the process can save your organization time and money.

    Provided By Dell Software

  • Webcasts // Jan 2014

    How to Secure Your Web Properties & Apps

    Cyber threats come at businesses from all directions. Whether it's through BYOD arrangements or the actions of hackers, companies face unprecedented risks in safeguarding data and managing compliance. Organizations must be equipped to deal with current and emerging cyber threats. This means securing the user's mission-critical web properties and applications,...

    Provided By DABCC