Hardware

Stay current with the components, peripherals and physical parts that constitute your IT department.

  • Webcasts // Jun 2015

    Securing Software's Future: Why API Design Matters

    Writing secure software is far cheaper for society as a whole than fixing vulnerable software after it is released. Teaching developers how to write secure software can be very effective in the short term, but over time security knowledge becomes less relevant, some security-conscious developers move into management, and additional...

    Provided By SecurityTube.net

  • Webcasts // Jun 2015

    Cloud IDS: Intrusion Detection for Shared Hosting

    On one hand, the users pay almost nothing to get their site or server out there, but on the other hand, their network neighborhood probably sucks and there's no way to tell if anyone is trying to access their stuff in a way they didn't intend. There's got to be...

    Provided By SecurityTube.net

  • Webcasts // May 2015

    Adventures in Mobile Telephone Security

    In this webcast, the presenter will explain about the risks are described and will demonstrate just how far a motivated amateur can legally go with some basic equipment, a little imagination and some directed effort. This includes running the users own base station, fuzzing the handset's baseband processor, capturing traffic...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Hardware Level Attacks

    A running computer program is not a mathematical abstraction, but a physical process taking place somewhere in the real world. This makes all programs and the devices they run on vulnerable to a variety of physical attacks that are often overlooked or dismissed as impractical.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    The Inception Framework: An APT Campaign in the Cloud, Mobile, and Embedded Systems

    Many of the indicators falsified by these attackers have been used as trusted information when attributing other know threats which should call into question the legitimacy of such claims. This webcast will walk through the discovery and processes they used to peel back the layers behind this sophisticated framework.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Bad USB Weaponized

    Explore the world of bad USB. How to build, deploy, and optimize the bad USB platform? Command and control structure. Hijinks with bad USB will include results achieved during deployment, systems owned, shells acquired, data acquired and coupling with social engineering and security awareness and training.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    My 4G WiFi Modem Sucks

    In this webcast, the presenter will essentially cover the techniques and tools used to find and exploit a number of vulnerabilities on the Telstra ZTE MF91 4G WiFi modem. Exploits include authentication bypass, recovery of credentials, and modification of core functionality, unexpected (and insecure) device behavior and unauthenticated factory reset.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Breaking Mobile Social Networks for Automated User Location Tracking

    Location-Based Social Networks (LBSNs) feature location-based friend discovery services attracting hundreds of millions of active users world-wide. While leading LBSN providers claim the well-protection of their users' location privacy, in this webcast, the presenter will show for the first time through real world attacks that these claims do not hold...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Network Attached Shell: N.A.S.ty Systems That Store Network Accessible Shells

    In this webcast, the presenter focus on "How to", and the implications of compromising network based storage systems, but will conclude that the absence of security in not only storage hardware, but networking hardware in general, has left data unprotected and millions of networks vulnerable to exploitation.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Don't Trust Your USB! How to Find Bugs in USB Device Drivers

    The Universal Serial Bus (USB) has become the standard interface for interconnecting computers with peripheral hardware today. USB is used to access Human Interface Devices (HIDs) like keyboards and mice, storage devices like USB flash sticks or external harddrives but also webcams, soundcards, Network Interface Cards (NICs), wireless cards, Bluetooth...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Gyrophone: Recognizing Speech From Gyroscope Signals

    In this webcast, the presenters will show that the gyroscopes found on most Smartphones are sensitive to measure acoustic signals in the vicinity of the phone. Since iOS and Android require no special permissions to access the gyro, their research shows that apps and active websites that cannot access the...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Hack Your ATM With Friend's Raspberry.py

    At all times there have been bad guys, who tried to steal money. ATM machines containing vast amounts of money have always been attractive targets. Until recently, criminals were only using physical weaknesses. Skimmers and shimmers for stealing magstripe-tracking data, fake pin pads and cameras for stealing pin codes, and...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Iron Crow: Android Kernel and OS Security Assessment

    Android is a pliable environment bent into different shapes by different OEMs. While Android offers several security mechanisms at the framework and at the application levels, there's little it offers to an OEM that customizes Android. The presenters have seen vulnerabilities in Android stemming out of excess file permissions, processes...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    A Large Scale Analysis of the Security of Embedded Firmware

    As embedded systems are more than ever present in the society, their security is becoming an increasingly important issue. However, with many recent analyses of individual firmware images, embedded systems acquired a reputation of being very insecure. However, the presenters still lack a global understanding of embedded systems security as...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Hacking Before Computers

    Before integrated circuits, digital circuits have been made with discrete transistors and the presenter "Invented" a flip-flop, not knowing that he is already exist. The first project with the Z80 (which the presenter still keeping and can show it), when the presenter did not have a computer so assembled a...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Scada Deep Inside: Protocols and Security Mechanisms

    In this webcast, the presenter will share the experience in analysis of most popular open and vendor's specific proprietary industrial protocols. For each protocol will be presented packet structure, real examples, in-secure features and possible hacks, at the end of the topic the presenter will share the practical approach, methodology...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Webcast: You Don't Know What You Don't Know! New Insights for Driving Cloud Strategy Through Analyzing Existing Behavior

    You can’t manage what you can’t measure and most of us find it difficult to formulate a strong cloud policy to complement what we’ve been doing in-house because it’s difficult to understand how good we are at managing our existing technologies. In this webinar we’ll explore the world of cloud...

    Provided By Hewlett-Packard (HP)

  • Webcasts // Mar 2015

    Mobile Forensics: MPE+ Android Malware Detection

    Malware on computers can infect, transmit and "Sell" personal data. Malware can also be used to "Blame" and cast doubt on collected evidence in a computer examination. If this is the case, why aren't these items being scanned when conducting a mobile device exam? In this webcast, the presenter will...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Trashing USB Layers Using the Facedancer Board

    A bottle of Laphroaig 18 later, they came to the conclusion that while libUSB and python-USB make it easy to prototype USB host-side applications, there wasn't really anything handy for prototyping device-side applications. So the next afternoon, they wired a MAX3421 EVK into the GoodFET41.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    iPhone Raw NAND Forensics and Recovery

    With the introduction of the 3Gs and iOS4 Apple introduced a highly advanced data protection scheme based on state of the art encryption and tight integration with the crypto-enabled hardware in the iPhone. The Apple data protection scheme introduced with iOS4 has effectively shut the door for data recovery on...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Active Disk Antiforensics and Hard Disk Backdoors

    In this webcast, the presenter discovered methods for extracting keys and firmware remotely from a few ZigBee chips, locally from nearly all of them and has the skill to inject packet into packets on layer 0. In spare time, the presenter maintains an open JTAG debugger, fiddles with pink pagers...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Memory Forensics and Security Analytics : Detecting Unknown Malware

    In this webcast, the presenter will show how open source tools can be used to detect 'Unknown' malware using memory forensics and security analytics. It will showcase how to build a security analytics engine that can automated perform memory forensics on thousands on hosts in near real time, to identify...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Introducing Weakness Into Security Device: Tuning to a Different Key

    When security devices such as NIDS/NIPS (Network Intrusion Detection/Prevention Systems) are developing their rules/signatures, exploit PoC's tend to be used to develop and test those rules. Sometimes there is lots of PoC code around for a single exploit. Not too much of leap of faith to suggest that those people...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Java's SSLSocket: How Bad APIs Compromise Security

    In this webcast, the presenter will explain about the implementation of SSL sockets in Java: internet security is hard, TLS is almost impossible and implementing TLS correctly in Java is "Nightmare!". This webcast will show how a badly designed security API introduced over 15 years ago, combined with misleading documentation...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Hard Drive Punch: Destroying Data as a Performative Act

    In general data is stored on technically sensitive systems and can easily be lost. At the same time files today appear often as indestructible once uploaded to the Internet. In this webcast, the presenter will explain about a variety of approaches on data destruction and how these connect to current...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Uncaging Microchips - Techniques for Chip Preparation

    An entertaining, thrilling and educational journey through the world of chip preparation. Deep insight into amateur-as well as professional methods and equipment is given, for the first, most important steps for analysis and attacks on dedicated hardware.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Towards General Purpose Reconfigurable Computing on Novena - FPGAs for Everybody with Novena

    The Novena open source laptop contains a FPGA, but free software support for FPGAs is lacking and requires root access to the hardware. The presenters' work is on providing a framework and a demonstration application for general purpose accelerator cores for Novena's FPGA.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Hardware Reverse-Engineering Tools New Threats - New Opportunities

    More recently, such forms of analysis have been obsoleted by advanced invasive analysis techniques that utilize capital-intensive failure analysis equipment and require extensive technical skills. One such technique, laser glitching, has recently been included into common criteria evaluations. The transient faults produced by laser glitching are similar in nature to...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Teridian SoC Exploitation: Exploration of Harvard Architecture Smart Grid Systems

    The Teridian system-on-a-chip platform wraps a complete system around a modified 8051 core, with additional features for chip security to block debug functionality and external access to memory. Additionally, the Harvard architecture design sets relatively rigid barriers between code and data (as opposed to x86/64), which presents an unintentional security...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Synthetic Data Generation and Defense in Depth Measurement of Web Applications

    In this webcast, the presenter will explain quickly cover architecture and system overviews, then dive into exploitation scenarios with techniques to attack Harvard architecture systems and code security implementations. End state results include pathways to gain coveted binary images of firmware and resident code execution.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Mobile: Unwrapping the Truth Analysis of Mobile Application Wrapping Solutions

    One of the latest trends of BYOD solutions is to employ "Mobile Application Management (MAM)", which allows organizations to wrap existing applications to perform policy enforcement and data/transport security at the application layer rather than at the device level.

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    More Shadow Walker the Progression of TLB Splitting on X86

    In this webcast, the presenter will cover the concept of Translation Lookaside Buffer (TLB) splitting for code hiding and how the evolution of the Intel x86 architecture has rendered previous techniques obsolete and new techniques to perform TLB-splitting on modern hardware.

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    2FF: Two Factor Failure

    Two Factor Authentication (2FA) systems are required by security standards and help to solve the many weaknesses of password authentication, and are increasingly found both in enterprise systems and in general web applications. Unfortunately, many 2FA systems have vulnerabilities - some glaring, some more subtle - and 2FA systems have...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Single Chip Microcontrollers: Beyond Arduino

    The world of Arduino has introduced many to the world of embedded controls. What does the world of commercial single chip microcontroller development look like? Are the users ready to move beyond Arduino? Come learn how the "Pros" do single chip embedded development and easy ways they can take their...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Hide Android Applications in Images

    In this webcast, the presenter has discovered a technique which enables them to hide whatever payload they wish in an Android PacKage (APK). The malicious payload is encrypted with AES, thus its reverse engineering does not give in any element.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Embedded Linux Device Drivers

    Purpose-built operating systems based on the Linux kernel are widely used in embedded system applications such as consumer electronics, networking equipment and industrial automation. Hardware for embedded systems is different from hardware for classical PC systems. While the general rules for Linux device drivers programming still apply, the hardware specifics...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Absolute Backdoor Revisited

    In this webcast, the presenter will includes a live demonstration of security flaws in modern anti-theft technologies that reside in firmware and PC BIOS of most popular laptops and some desktop computers. While the general idea behind anti-theft technology is good, improper implementation can render it useless as well as...

    Provided By SecurityTube.net

  • Webcasts // Jul 2014

    Citrix App Orchestration 2.5 Overview

    Citrix App Orchestration accelerates and automates the delivery of Desktops-as-a-Service (DaaS). It is built on proven Citrix best practices; App Orchestration helps service providers design and implement a secure, multi-tenant, multi-domain and multi-location based environment.

    Provided By Citrix Systems

  • Webcasts // Jul 2014

    Overview of the Citrix Client Virtualization Solution

    In this webcast, the presenter explains about how the Citrix client virtualization solution and Intel Core processors that helps the organization to manage and secure Windows and Mac devices. The client virtualization solution includes both XenClient and DesktopPlayer.

    Provided By Citrix Systems

  • Webcasts // Jun 2014

    Extend the Benefits of VMware Horizon 6 with Liquidware Labs

    VMware Horizon 6 provides more options than ever to deliver workspaces to the users tailored to their needs and requirements. In this webcast, the presenter will explain about the benefits of VMware Horizon 6. The presenter will also cover how the user can use their solutions and established methodology of...

    Provided By DABCC