Hardware

Servers, switches, and storage are still the foundation of your enterprise, and next-gen high-performance equipment is key for 21st century business. You can find expert guidance and thought leadership here.

  • Securing Software's Future: Why API Design Matters

    Webcasts // Jun 2015 // provided by SecurityTube.net

    Writing secure software is far cheaper for society as a whole than fixing vulnerable software after it is released. Teaching developers how to write secure software can be very effective in the short term, but over time security knowledge becomes less relevant, some security-conscious developers move into management, and additional ...

    Watch Now
  • Cloud IDS: Intrusion Detection for Shared Hosting

    Webcasts // Jun 2015 // provided by SecurityTube.net

    On one hand, the users pay almost nothing to get their site or server out there, but on the other hand, their network neighborhood probably sucks and there's no way to tell if anyone is trying to access their stuff in a way they didn't intend. There's got to be ...

    Watch Now
  • Adventures in Mobile Telephone Security

    Webcasts // May 2015 // provided by SecurityTube.net

    In this webcast, the presenter will explain about the risks are described and will demonstrate just how far a motivated amateur can legally go with some basic equipment, a little imagination and some directed effort. This includes running the users own base station, fuzzing the handset's baseband processor, capturing traffic ...

    Watch Now
  • Hardware Level Attacks

    Webcasts // Apr 2015 // provided by SecurityTube.net

    A running computer program is not a mathematical abstraction, but a physical process taking place somewhere in the real world. This makes all programs and the devices they run on vulnerable to a variety of physical attacks that are often overlooked or dismissed as impractical.

    Watch Now
  • The Inception Framework: An APT Campaign in the Cloud, Mobile, and Embedded Systems

    Webcasts // Apr 2015 // provided by SecurityTube.net

    Many of the indicators falsified by these attackers have been used as trusted information when attributing other know threats which should call into question the legitimacy of such claims. This webcast will walk through the discovery and processes they used to peel back the layers behind this sophisticated framework.

    Watch Now
  • Bad USB Weaponized

    Webcasts // Apr 2015 // provided by SecurityTube.net

    Explore the world of bad USB. How to build, deploy, and optimize the bad USB platform? Command and control structure. Hijinks with bad USB will include results achieved during deployment, systems owned, shells acquired, data acquired and coupling with social engineering and security awareness and training.

    Watch Now
  • My 4G WiFi Modem Sucks

    Webcasts // Apr 2015 // provided by SecurityTube.net

    In this webcast, the presenter will essentially cover the techniques and tools used to find and exploit a number of vulnerabilities on the Telstra ZTE MF91 4G WiFi modem. Exploits include authentication bypass, recovery of credentials, and modification of core functionality, unexpected (and insecure) device behavior and unauthenticated factory reset.

    Watch Now
  • Breaking Mobile Social Networks for Automated User Location Tracking

    Webcasts // Apr 2015 // provided by SecurityTube.net

    Location-Based Social Networks (LBSNs) feature location-based friend discovery services attracting hundreds of millions of active users world-wide. While leading LBSN providers claim the well-protection of their users' location privacy, in this webcast, the presenter will show for the first time through real world attacks that these claims do not hold ...

    Watch Now
  • Network Attached Shell: N.A.S.ty Systems That Store Network Accessible Shells

    Webcasts // Apr 2015 // provided by SecurityTube.net

    In this webcast, the presenter focus on "How to", and the implications of compromising network based storage systems, but will conclude that the absence of security in not only storage hardware, but networking hardware in general, has left data unprotected and millions of networks vulnerable to exploitation.

    Watch Now
  • Don't Trust Your USB! How to Find Bugs in USB Device Drivers

    Webcasts // Apr 2015 // provided by SecurityTube.net

    The Universal Serial Bus (USB) has become the standard interface for interconnecting computers with peripheral hardware today. USB is used to access Human Interface Devices (HIDs) like keyboards and mice, storage devices like USB flash sticks or external harddrives but also webcams, soundcards, Network Interface Cards (NICs), wireless cards, Bluetooth ...

    Watch Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?