Mobility

Mobile technologies, from wireless carriers, machine-to-machine connections and new devices, constantly affect corporate productivity. Use the latest vendor white papers to keep yourself ahead of the game.

  • Webcasts // May 2015

    Master the Mobile Mindshift

    Engineer your business to win the mobile moment Mobility has produced a mind shift with your customers. They have become the consumers of now. They demand an exceptional mobile user experience anytime and anywhere. Forrester Research calls this the mobile moment, a point in time when...

    Sponsored By Hewlett-Packard (HP)

  • Webcasts // May 2015

    Master the Mobile Mindshift: Engineer Your Business to Win the Mobile Moment

    Mobility has produced a mind shift with your customers. They have become the consumers of now. They demand an exceptional mobile user experience anytime and anywhere. Forrester Research calls this the mobile moment, a point in time when someone pulls out a mobile device to get what they want –...

    Sponsored By Hewlett-Packard (HP)

  • Webcasts // Mar 2015

    Securing SMEs in an evolving Threat Landscape - On Demand Webcast

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // Feb 2015

    On-demand Webcast: Mobile devices, wearables, and the future of identity

    For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and even all your private communications. Today, the very concept of digital identity is under fire. Every week, we read about a new...

    Sponsored By Centrify

  • Webcasts // Feb 2015

    Wind River Video Inside the Internet of Things

    Industrial applications -- from manufacturing to oil and gas to construction to healthcare – are growing more dynamic and agile thanks to the Internet of Things. This trend is extending to the consumer market and to traditional businesses, as well. As Internet-connected devices are alter the technology landscape, many...

    Sponsored By Wind River Systems

  • Webcasts // Jan 2015

    Harnessing Data in the Internet of Things Webcast

    This prerecorded webinar features Mr. Gary Barnett of Ovum research as he discusses the data management challenges that organizations face in their attempts to conquer Big Data and the need for an enterprise-scale database management platform that is designed to anticipate and bridge the gap between edge-connected devices and machines...

    Sponsored By IBM

  • Webcasts // Feb 2015

    There's Waldo! Tracking Users Via Mobile Apps

    Sure the users assume the NSA can track them, but due to insecure mobile apps, it may be possible for anyone else to track them too. Mobile apps often leverage user location data to provide a custom experience. Unfortunately, as their case studies show, this is often done insecurely, revealing...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Five Not-Totally-Crazy Ways to Build for Usability

    As security becomes an increasingly mainstream concern, the presenters are challenged with making their products easier to use. The presenter, CTO of the secure photo sharing app Glimpse, will share several highly effective (including some unconventional) ways technologists can make their products more user-friendly.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Knock Knock: A Survey of iOS Authentication Methods

    Almost all \"Interesting\" mobile applications don't exist in a vacuum. They rely on external systems for much of their data, and as such, frequently need a method for identifying and authenticating the application's user to the server. How this happens varies widely.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Marco Cova: Combative Evasive Software

    In this webcast, the presenter research interests include most areas of systems security, with an emphasis on web-based malware analysis and detection, botnets, and vulnerability analysis. The presenter also led the design and development of Wepawet, a publicly-available service for the analysis of malicious web pages.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    OWASP Mobile Top Ten - Why They Matter and What We Can Do

    In this webcast, the presenter will examine the current OWASP mobile top ten security risks. They will briefly examine each one, and provide tangible reasons why they would be a concern for the users or their organization, as well as how to best secure against them.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Plunder, Pillage and Print - The Art of Leverage Multifunction Printers During Penetration Testing

    In this webcast, the presenter will go beyond the common printer issues and focus around penetration testing of internal networks by focusing on embedded devices such as MultiFunction Printer (MFP). Discussing methods and techniques regularly used to plunder and pillage these devices for user credentials.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    An Open Hardware and Software Platform, Based on the (Nominally) Closed-Source MT6260 SoC

    In this webcast, the presenter will introduce Fernvale, a reverse-engineered, open hardware and software platform based upon Mediatek's MT6260 value phone SoC. The MT6260 is the chip that powers many of the $10 GSM feature phones produced by the Shanzhai. Fernvale is made available as open-licensed schematics, board layouts, and...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    (In)Security of Mobile Banking

    In this webcast, the presenters will present a deep analysis of banking mobile apps available in the world. Based on static and dynamic analysis as well as on the analysis of the final source code they show that a vast majority of them are not respecting users' privacy and users'...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Karsten Nohl: Mobile Self-Defense

    The people know that mobile networks can - and do - attack them on many fronts. As this webcast will show, even 3G is attackable. It's high time that they upgrade from complaining to self-defense. Modern phones include all components necessary to block - or at least make visible -...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Manna From Heaven: Improving the State of Wireless Rogue AP Attacks

    The current state of theoretical attacks against wireless networks should allow this wireless world to be fully subverted for all but some edge cases. Devices can be fooled into connecting to spoofed networks, authentication to wireless networks can either be cracked or intercepted, and ability to capture credentials at a...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    NSA Playset GSM Sniffing

    A5/1, as implemented in GSM, was broken wide open in 2003, yet GSM is still the most widely used mobile communications protocol in the world. Introducing TWILIGHTVEGETABLE, the presenters' attempt to pull together the past decade of GSM attacks into a single, coherent toolset, and finally make real, practical, GSM...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Detecting Bluetooth Surveillance Systems

    Departments of transportation around the United States have deployed \"Little white boxes\" - Bluetooth detectors used to monitor traffic speeds and activity. While they're supposedly anonymous, they detect a nearly-unique ID from every car, phone, and PC that passes by.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Formal Analysis of Security Procedures in LTE

    The only part of the Long Term Evolution (LTE) security standard that has been formally analyzed is the Authentication and Key Agreement (AKA) procedure. It is not clear how well existing security related verification tools can handle other types of procedures. In this webcast, the presenter will use ProVerif to...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Run Away if You Can: Persistent Jamming Attacks Against Channel Hopping Wi-Fi Devices in Dense Networks

    Wireless Local Area Networks (WLANs) can adopt channel hopping technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals. Even though channel hopping technologies are effective against proactive types of jamming, it has been reported that reactive jammers could attack the targets...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    On-demand Webcast: SaaS Apps? BYOD? Take Cloud Control

    Centrify User Suite Puts IT Back in the Driver’s Seat Cloud apps continue to find their way into enterprises, promising productivity but often causing headaches. Each app has its own set of login credentials for people to forget or re-use, IT has no centralized way to grant and revoke access...

    Provided By Centrify

  • Webcasts // Nov 2014

    Attacking Mobile Broadband Modems Like a Criminal Would

    While there has certainly been some interesting research into the security of mobile broadband modems, or \"Dongles\", in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Android FakeID Vulnerability Walkthrough

    In this webcast, the presenter will present new Android vulnerability with widespread impact: a flaw in Android application handling, allowing malicious applications to escape the normal application sandbox and get special security privileges without any user notification.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Cellular Exploitation on a Global Scale the Rise and Fall of the Control Protocol

    In this webcast, the presenter will discuss and disclose how over-the-air code execution can be obtained on the major cellular platforms and networks (GSM/CDMA/LTE). Including but not limited to Android, iOS, Blackberry, and embedded M2M devices. The listener will come away from this webcast, armed with detailed insight into these...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    It Just (Net)works the Truth About iOS 7's Multipeer Connectivity Framework

    With the release of iOS 7, Apple has quietly introduced a nifty feature called multipeer connectivity. Using a surprisingly small and simple set of APIs, developers can create applications that have the ability to discover and directly communicate with nearby iOS devices over Bluetooth or WiFi, without the need for...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Choose an Intelligent Database

    The "Internet of Things" refers to the growing number of devices and sensors that communicate and interact via the Internet, offering businesses new customers and revenue opportunities. Harnessing data from billions of connected devices lies in the ability to store, access, and query SQL and NoSQL data together, seamlessly. Check...

    Provided By IBM

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Provided By Citrix Online

  • Webcasts // Sep 2014

    Hacking Smart Phones

    In this webcast, the presenter will take a look at the Smartphone attack surface, only from and end-to-end point of view. The baseband type stuff and things owned by the telco's will not be covered. Basically, it'll cover 5 major areas: identifying operating systems (through for example the user-agent with...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Wideband GSM Sniffing

    GSM is still the most widely used security technology in the world with a user base of 5 billion and a quickly growing number of critical applications. 26C3's rainbow table attack on GSM's A5/1 encryption convinced many users that GSM calls should be considered unprotected.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Stealing a Mobile Identity Using Wormholes

    Authentication in mobile networks is usually done using a secure element which is commonly a sim-card. It is a tamper resistant device that should prevent cloning of mobile identities by legitimate users as well as attackers. Mobile network operators as well as most users have an interest in preventing the...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Android Geolocation Using GSM Network

    In this webcast, the presenter will introduce a new forensic technique that allows collecting users' past locations on most current Android phones, within a few seconds. It becomes possible to tell where the user was at a given time, or where a phone call took place over the last few...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Secure Communications Below the Hearing Threshold

    In this webcast, the presenter will focus on hidden communications in VoIP and GSM in which voice data is typically compressed and transmitted in real-time. A framework has been developed to meet these requirements, providing interfaces for robust steganographic algorithms.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    ZDNet APAC webinar: Business Intelligence on the move

    Join us for this LIVE event! Monday, 29 September at 3pm Australian Eastern Standard Time Business Intelligence used to be the domain of the experts, with small crews of data analysts controlling the flow of business insights. But a great democratisation is unfolding and not only is Business Intelligence being...

    Provided By ZDNet

  • Webcasts // Sep 2014

    The Security of MDM (Mobile Device Management) Systems

    More and more corporate are deploying mobile devices like Smartphone's and pads. To manage these devices, several solutions are available like MobileIron, good technology, Symantec and several others. In this webcast, the presenter installed and studied two of these solutions from a security point of view. More precisely, if it...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    The Business Value of Cloud-Managed Wireless Networks - IDC Webinar

    Cloud-managed Wi-Fi promises greater networking efficiencies and flexibility in managing, scaling and upgrading the wireless network. But cloud-managed Wi-Fi may not be the right solution for everyone. Watch this webcast to hear IDC analyst and Vice President, Rohit Mehra, discuss the critical factors to take into account as you...

    Provided By Hewlett-Packard

  • Webcasts // Sep 2014

    On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

    Provided By Hewlett-Packard

  • Webcasts // Aug 2014

    On the Feasibility of Large-Scale Infections of iOS Devices

    While Apple iOS has gained increasing attention from attackers due to its rising popularity, very few large scale infections of iOS devices have been discovered because of iOS' advanced security architecture. In this webcast, the presenter will show that infecting a large number of iOS devices through botnets is feasible.

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Take Mobility to New Heights with Mobile Workspaces

    In this webcast, the presenter will discuss about mobilize the user's business, the user need an end-to-end mobile workspace solution. Discover how Citrix Workspace Suite is the most complete solution powering mobile workspaces today and how the user can save up to 70%.

    Provided By Citrix Systems

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Provided By Dell Software

  • Webcasts // Jul 2014

    The New Cloud Framework: Best Practices for Enterprise Data

    The cloud is becoming the standard for enterprises, making it easier to manage mobility, BYOA, and data sprawl. The cloud’s accessibility and scalability makes it a natural solution to meet the needs of employees and still maintain control of corporate data. Yet the cloud has also introduced performance and privacy...

    Provided By Druva Software