Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • Webcasts // Feb 2015

    Live Webcast: Mobile devices, wearables, and the future of identity

    For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and even all your private communications. Today, the very concept of digital identity is under fire. Every week, we read about a new...

    Sponsored By Centrify

  • Webcasts // Nov 2014

    On-demand Webcast: SaaS Apps? BYOD? Take Cloud Control

    Centrify User Suite Puts IT Back in the Driver’s Seat Cloud apps continue to find their way into enterprises, promising productivity but often causing headaches. Each app has its own set of login credentials for people to forget or re-use, IT has no centralized way to grant and revoke access...

    Sponsored By Centrify

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • Webcasts // Sep 2014

    ZDNet APAC webinar: Business Intelligence on the move

    Join us for this LIVE event! Monday, 29 September at 3pm Australian Eastern Standard Time Business Intelligence used to be the domain of the experts, with small crews of data analysts controlling the flow of business insights. But a great democratisation is unfolding and not only is Business Intelligence being...

    Sponsored By ZDNet

  • Webcasts // Jun 2014

    On-demand Webcast: Your Strategy at the Intersection of Cloud and Mobile

    We live in an enterprise world where Bring Your Own Device (BYOD) is a fait accompli and mobile is part of all of our lives. IT and mobility stakeholders continue to address ongoing changes with audiences, OS environments, data formats, coding methods, business processes and more. The case for investing...

    Sponsored By SAP

  • Webcasts // Jun 2014

    Financial Services Mobility Webinar brought to you by VMware and IDC

    What you will take away from the webinar: Perspective on today’s mobile financial enterprise Drivers and business imperatives for the growth of mobility Transformative nature of mobile innovation Style of IT that mobility brings to the financial enterprise

    Sponsored By VMware

  • Webcasts // Feb 2015

    Five Not-Totally-Crazy Ways to Build for Usability

    As security becomes an increasingly mainstream concern, the presenters are challenged with making their products easier to use. The presenter, CTO of the secure photo sharing app Glimpse, will share several highly effective (including some unconventional) ways technologists can make their products more user-friendly.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Knock Knock: A Survey of iOS Authentication Methods

    Almost all \"Interesting\" mobile applications don't exist in a vacuum. They rely on external systems for much of their data, and as such, frequently need a method for identifying and authenticating the application's user to the server. How this happens varies widely.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    There's Waldo! Tracking Users Via Mobile Apps

    Sure the users assume the NSA can track them, but due to insecure mobile apps, it may be possible for anyone else to track them too. Mobile apps often leverage user location data to provide a custom experience. Unfortunately, as their case studies show, this is often done insecurely, revealing...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Marco Cova: Combative Evasive Software

    In this webcast, the presenter research interests include most areas of systems security, with an emphasis on web-based malware analysis and detection, botnets, and vulnerability analysis. The presenter also led the design and development of Wepawet, a publicly-available service for the analysis of malicious web pages.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Plunder, Pillage and Print - The Art of Leverage Multifunction Printers During Penetration Testing

    In this webcast, the presenter will go beyond the common printer issues and focus around penetration testing of internal networks by focusing on embedded devices such as MultiFunction Printer (MFP). Discussing methods and techniques regularly used to plunder and pillage these devices for user credentials.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    OWASP Mobile Top Ten - Why They Matter and What We Can Do

    In this webcast, the presenter will examine the current OWASP mobile top ten security risks. They will briefly examine each one, and provide tangible reasons why they would be a concern for the users or their organization, as well as how to best secure against them.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    An Open Hardware and Software Platform, Based on the (Nominally) Closed-Source MT6260 SoC

    In this webcast, the presenter will introduce Fernvale, a reverse-engineered, open hardware and software platform based upon Mediatek's MT6260 value phone SoC. The MT6260 is the chip that powers many of the $10 GSM feature phones produced by the Shanzhai. Fernvale is made available as open-licensed schematics, board layouts, and...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    (In)Security of Mobile Banking

    In this webcast, the presenters will present a deep analysis of banking mobile apps available in the world. Based on static and dynamic analysis as well as on the analysis of the final source code they show that a vast majority of them are not respecting users' privacy and users'...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Karsten Nohl: Mobile Self-Defense

    The people know that mobile networks can - and do - attack them on many fronts. As this webcast will show, even 3G is attackable. It's high time that they upgrade from complaining to self-defense. Modern phones include all components necessary to block - or at least make visible -...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Manna From Heaven: Improving the State of Wireless Rogue AP Attacks

    The current state of theoretical attacks against wireless networks should allow this wireless world to be fully subverted for all but some edge cases. Devices can be fooled into connecting to spoofed networks, authentication to wireless networks can either be cracked or intercepted, and ability to capture credentials at a...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    NSA Playset GSM Sniffing

    A5/1, as implemented in GSM, was broken wide open in 2003, yet GSM is still the most widely used mobile communications protocol in the world. Introducing TWILIGHTVEGETABLE, the presenters' attempt to pull together the past decade of GSM attacks into a single, coherent toolset, and finally make real, practical, GSM...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Detecting Bluetooth Surveillance Systems

    Departments of transportation around the United States have deployed \"Little white boxes\" - Bluetooth detectors used to monitor traffic speeds and activity. While they're supposedly anonymous, they detect a nearly-unique ID from every car, phone, and PC that passes by.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Formal Analysis of Security Procedures in LTE

    The only part of the Long Term Evolution (LTE) security standard that has been formally analyzed is the Authentication and Key Agreement (AKA) procedure. It is not clear how well existing security related verification tools can handle other types of procedures. In this webcast, the presenter will use ProVerif to...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Run Away if You Can: Persistent Jamming Attacks Against Channel Hopping Wi-Fi Devices in Dense Networks

    Wireless Local Area Networks (WLANs) can adopt channel hopping technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals. Even though channel hopping technologies are effective against proactive types of jamming, it has been reported that reactive jammers could attack the targets...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Attacking Mobile Broadband Modems Like a Criminal Would

    While there has certainly been some interesting research into the security of mobile broadband modems, or \"Dongles\", in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Android FakeID Vulnerability Walkthrough

    In this webcast, the presenter will present new Android vulnerability with widespread impact: a flaw in Android application handling, allowing malicious applications to escape the normal application sandbox and get special security privileges without any user notification.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Cellular Exploitation on a Global Scale the Rise and Fall of the Control Protocol

    In this webcast, the presenter will discuss and disclose how over-the-air code execution can be obtained on the major cellular platforms and networks (GSM/CDMA/LTE). Including but not limited to Android, iOS, Blackberry, and embedded M2M devices. The listener will come away from this webcast, armed with detailed insight into these...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    It Just (Net)works the Truth About iOS 7's Multipeer Connectivity Framework

    With the release of iOS 7, Apple has quietly introduced a nifty feature called multipeer connectivity. Using a surprisingly small and simple set of APIs, developers can create applications that have the ability to discover and directly communicate with nearby iOS devices over Bluetooth or WiFi, without the need for...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Hacking Smart Phones

    In this webcast, the presenter will take a look at the Smartphone attack surface, only from and end-to-end point of view. The baseband type stuff and things owned by the telco's will not be covered. Basically, it'll cover 5 major areas: identifying operating systems (through for example the user-agent with...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Wideband GSM Sniffing

    GSM is still the most widely used security technology in the world with a user base of 5 billion and a quickly growing number of critical applications. 26C3's rainbow table attack on GSM's A5/1 encryption convinced many users that GSM calls should be considered unprotected.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Stealing a Mobile Identity Using Wormholes

    Authentication in mobile networks is usually done using a secure element which is commonly a sim-card. It is a tamper resistant device that should prevent cloning of mobile identities by legitimate users as well as attackers. Mobile network operators as well as most users have an interest in preventing the...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Secure Communications Below the Hearing Threshold

    In this webcast, the presenter will focus on hidden communications in VoIP and GSM in which voice data is typically compressed and transmitted in real-time. A framework has been developed to meet these requirements, providing interfaces for robust steganographic algorithms.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Android Geolocation Using GSM Network

    In this webcast, the presenter will introduce a new forensic technique that allows collecting users' past locations on most current Android phones, within a few seconds. It becomes possible to tell where the user was at a given time, or where a phone call took place over the last few...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    The Security of MDM (Mobile Device Management) Systems

    More and more corporate are deploying mobile devices like Smartphone's and pads. To manage these devices, several solutions are available like MobileIron, good technology, Symantec and several others. In this webcast, the presenter installed and studied two of these solutions from a security point of view. More precisely, if it...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

    Provided By Hewlett-Packard

  • Webcasts // Sep 2014

    The Business Value of Cloud-Managed Wireless Networks - IDC Webinar

    Cloud-managed Wi-Fi promises greater networking efficiencies and flexibility in managing, scaling and upgrading the wireless network. But cloud-managed Wi-Fi may not be the right solution for everyone. Watch this webcast to hear IDC analyst and Vice President, Rohit Mehra, discuss the critical factors to take into account as you...

    Provided By Hewlett-Packard

  • Webcasts // Aug 2014

    On the Feasibility of Large-Scale Infections of iOS Devices

    While Apple iOS has gained increasing attention from attackers due to its rising popularity, very few large scale infections of iOS devices have been discovered because of iOS' advanced security architecture. In this webcast, the presenter will show that infecting a large number of iOS devices through botnets is feasible.

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Take Mobility to New Heights with Mobile Workspaces

    In this webcast, the presenter will discuss about mobilize the user's business, the user need an end-to-end mobile workspace solution. Discover how Citrix Workspace Suite is the most complete solution powering mobile workspaces today and how the user can save up to 70%.

    Provided By Citrix Systems

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Provided By Dell Software

  • Webcasts // Jul 2014

    The New Cloud Framework: Best Practices for Enterprise Data

    The cloud is becoming the standard for enterprises, making it easier to manage mobility, BYOA, and data sprawl. The cloud’s accessibility and scalability makes it a natural solution to meet the needs of employees and still maintain control of corporate data. Yet the cloud has also introduced performance and privacy...

    Provided By Druva Software

  • Webcasts // Jul 2014

    A New Approach to Endpoint Data Protection

    The rising number of mobile workers makes endpoint data protection increasingly important for organizations of all types and sizes. Now more than ever, business and IT decision makers must take a holistic view that includes a wide variety of mobile devices including laptops, smartphones and tablets. But what is the...

    Provided By Druva Software

  • Webcasts // Jun 2014

    Breaking Through the Bottleneck : Mobile Malware Is Outbreak Spreading Like Wildfire

    In this webcast, the presenter explains about various advanced evasion techniques used by mobile malware to break the bottleneck of spreading. The presenter led both TrustGo security labs and security team for Chinese android app stores. They have seen plenty of mobile malware and malware technologies.

    Provided By SecurityTube.net

  • Webcasts // Jun 2014

    CopperDroid on the Reconstruction of Android Malware Behaviors

    Today mobile devices and their application marketplaces drive the entire economy of the mobile landscape. For instance, Android platforms alone have produced staggering revenues exceeding 9 billion USD, which unfortunately attracts cybercriminals with malware now hitting the Android markets at an alarmingly rising pace. To better understand this slew of...

    Provided By SecurityTube.net

  • Webcasts // May 2014

    On-demand Webcast: Beyond High Availability

    Information has become the lifeblood of most enterprises, and competitive advantage goes to those organizations that can make data available to decision-makers anytime, anywhere and in whatever context needed. This is often difficult to accomplish in today's siloed environments in which data is often maintained within legacy environments. In addition,...

    Provided By Dell Software

  • Webcasts // Nov 2014

    On-demand Webcast: SaaS Apps? BYOD? Take Cloud Control

    Centrify User Suite Puts IT Back in the Driver’s Seat Cloud apps continue to find their way into enterprises, promising productivity but often causing headaches. Each app has its own set of login credentials for people to forget or re-use, IT has no centralized way to grant and revoke access...

    Sponsored By Centrify

  • Webcasts // Sep 2014

    ZDNet APAC webinar: Business Intelligence on the move

    Join us for this LIVE event! Monday, 29 September at 3pm Australian Eastern Standard Time Business Intelligence used to be the domain of the experts, with small crews of data analysts controlling the flow of business insights. But a great democratisation is unfolding and not only is Business Intelligence being...

    Sponsored By ZDNet

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • Webcasts // Jun 2014

    On-demand Webcast: Your Strategy at the Intersection of Cloud and Mobile

    We live in an enterprise world where Bring Your Own Device (BYOD) is a fait accompli and mobile is part of all of our lives. IT and mobility stakeholders continue to address ongoing changes with audiences, OS environments, data formats, coding methods, business processes and more. The case for investing...

    Sponsored By SAP

  • Webcasts // Jun 2014

    Financial Services Mobility Webinar brought to you by VMware and IDC

    What you will take away from the webinar: Perspective on today’s mobile financial enterprise Drivers and business imperatives for the growth of mobility Transformative nature of mobile innovation Style of IT that mobility brings to the financial enterprise

    Sponsored By VMware

  • Webcasts // Feb 2015

    Live Webcast: Mobile devices, wearables, and the future of identity

    For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and even all your private communications. Today, the very concept of digital identity is under fire. Every week, we read about a new...

    Sponsored By Centrify

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Provided By Dell Software

  • Webcasts // Aug 2011

    Rethinking the Corporate Network

    Today's corporate networks face unprecedented levels of stress as they try to handle new devices, applications, and technologies. New demands, such as smartphones, tablets, cloud-based services, and virtualization have dramatically changed the way corporate networks need to be designed to deliver a high-quality user experience. But these changes...

    Provided By Alcatel-Lucent Enterprise

  • Webcasts // Jun 2013

    Managing Unstructured Data for Dodd-Frank Compliance

    Unstructured data comprise up to 80% of the information within an organization. This includes PDF’s, Word documents, Excel spread sheets, PowerPoints, FAX’s, emails, hard copy documents, videos, social media content, and much more. The impending implementation of Dodd-Frank regulations will make comprehensive, agile management and reporting of this ever-increasing pool...

    Provided By Open Text

  • Webcasts // Jun 2013

    Information Governance: The Key To Unlocking Dodd-Frank Regulations

    This webinar offers solutions to the Dodd-Frank compliance issues and challenges that target the Financial Services Industry.

    Provided By Open Text

  • Webcasts // Jun 2013

    20 Information Governance Questions and Answers in 40 Minutes

    As a new means to managing information, Information Governance, is a hot topic right now. This webinar answers the top 20 questions that have been asked on the subject.

    Provided By Open Text

  • Webcasts // Sep 2014

    On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

    Provided By Hewlett-Packard

  • Webcasts // Sep 2014

    The Business Value of Cloud-Managed Wireless Networks - IDC Webinar

    Cloud-managed Wi-Fi promises greater networking efficiencies and flexibility in managing, scaling and upgrading the wireless network. But cloud-managed Wi-Fi may not be the right solution for everyone. Watch this webcast to hear IDC analyst and Vice President, Rohit Mehra, discuss the critical factors to take into account as you...

    Provided By Hewlett-Packard

  • Webcasts // Jun 2013

    On-demand Webcast - Application Performance Monitoring (APM) for Mobile Applications and Services

    For many companies mobile applications are today a viable mean to generate customer revenue, loyalty and satisfaction. As the new business channel delivers business value, it means that companies should be able to proactively monitor, manage and improve the end user experience of these mobile application services. Join us to...

    Provided By HP US

  • Webcasts // Jun 2013

    On-demand Webcast - HP Application Performance Monitoring (APM) for Mobile Applications and Services

    For many companies mobile applications are today a viable mean to generate customer revenue, loyalty and satisfaction. As the new business channel delivers business value, it means that companies should be able to proactively monitor, manage and improve the end user experience of these mobile application services. Join us to...

    Provided By HP US

  • Webcasts // Sep 2014

    Hacking Smart Phones

    In this webcast, the presenter will take a look at the Smartphone attack surface, only from and end-to-end point of view. The baseband type stuff and things owned by the telco's will not be covered. Basically, it'll cover 5 major areas: identifying operating systems (through for example the user-agent with...

    Provided By SecurityTube.net

  • Webcasts // Jun 2013

    BYOD : The Privacy and Compilance Risks From Bringing Your Own Mobile Device to Work

    In this webcast, the presenter discuss about BYOD. BYOD is a disaster. It is a privacy fiasco. It will cause massive data breaches and privacy violations. PLUS -n BYOD is more expensive than running two separate devices.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    The Security of MDM (Mobile Device Management) Systems

    More and more corporate are deploying mobile devices like Smartphone's and pads. To manage these devices, several solutions are available like MobileIron, good technology, Symantec and several others. In this webcast, the presenter installed and studied two of these solutions from a security point of view. More precisely, if it...

    Provided By SecurityTube.net

  • Webcasts // Jun 2014

    Breaking Through the Bottleneck : Mobile Malware Is Outbreak Spreading Like Wildfire

    In this webcast, the presenter explains about various advanced evasion techniques used by mobile malware to break the bottleneck of spreading. The presenter led both TrustGo security labs and security team for Chinese android app stores. They have seen plenty of mobile malware and malware technologies.

    Provided By SecurityTube.net

  • Webcasts // Oct 2012

    Cisco and Citrix: Mobile Workstyles and BYOD Solutions

    In this webcast, the presenter explains about how Cisco and Citrix intend to develop \"Mobile workstyle and BYOD\" solutions that give mobile users a unified way to securely access business apps, data, voice and collaboration services from any device, anywhere.

    Provided By Citrix Systems

  • Webcasts // Jun 2012

    Executive Mobility Solutions Overview

    For executives, work is not a place. It's what they do wherever and whenever business needs to be done, and now they want to do it all from the coolest devices. In this webcast, the presenter explains about how Citrix executive mobility solutions enable executives to increase their productivity, improve...

    Provided By Citrix Systems

  • Webcasts // Sep 2014

    Secure Communications Below the Hearing Threshold

    In this webcast, the presenter will focus on hidden communications in VoIP and GSM in which voice data is typically compressed and transmitted in real-time. A framework has been developed to meet these requirements, providing interfaces for robust steganographic algorithms.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Android Geolocation Using GSM Network

    In this webcast, the presenter will introduce a new forensic technique that allows collecting users' past locations on most current Android phones, within a few seconds. It becomes possible to tell where the user was at a given time, or where a phone call took place over the last few...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Wideband GSM Sniffing

    GSM is still the most widely used security technology in the world with a user base of 5 billion and a quickly growing number of critical applications. 26C3's rainbow table attack on GSM's A5/1 encryption convinced many users that GSM calls should be considered unprotected.

    Provided By SecurityTube.net

  • Webcasts // Jun 2012

    Bring-Your-Own-Device Solutions Overview

    In this webcast, the presenter explains about how Citrix Bring-Your-Own-Device (BYOD) solutions enable IT to embrace consumerization, empower employees and simplify IT. Find out how Citrix BYOD solutions free people to access their desktops, applications and files from their own personal laptops, tablets and Smartphone's, while IT is able to...

    Provided By Citrix Systems

  • Webcasts // Aug 2014

    Take Mobility to New Heights with Mobile Workspaces

    In this webcast, the presenter will discuss about mobilize the user's business, the user need an end-to-end mobile workspace solution. Discover how Citrix Workspace Suite is the most complete solution powering mobile workspaces today and how the user can save up to 70%.

    Provided By Citrix Systems

  • Webcasts // Jan 2014

    Intent on Being a Good Android Citizen?

    Securing intents properly requires a defensive approach of some old techniques plus an added step of validating some assumptions. In this webcast, the presenter aimed mainly for app developers - learn how intents work under the hood, how to secure the user intents and how to secure their assumptions to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    OWASP Security Shepherd - Mobile Web Security Awareness and Education

    The OWASP security shepherd project has been designed and implemented with the aim of fostering and improving security awareness among a varied skillset demographic. Security shepherd covers the OWASP top ten web app risks and has recently been injected with totally new content to cover the OWASP top ten mobile...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Smart Storage Scanning for Mobile Apps - Attacks and Exploit

    Mobile application hacking and its security is becoming a major concern in today's world especially with BYOD and user's jail breaking/rooting their devices. Scanning and vulnerabilities detections are two major areas for mobile applications in current state. Attacking techniques and exploit delivery on different platform are evolving, protection is even...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Getting a Handle on Mobile Security

    Mobile development is one of the largest growth areas in all of software. The last decade has seen an explosion of mobile devices, operating systems, development environments, libraries, toolkits and app stores. Organizations are racing to construct mobile applications that harness the power of the mobile paradigm.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Locating Mobile Phones Using SS7

    In this webcast, the presenter explains what SS7 features are exploited for locating mobile phones, how the returned information has to be interpreted and what the user can (and can't) do against being located that way without having to turn off their phone altogether.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Running Your Own GSM Network

    In this webcast, the presenter will mark the first public release of a new GPL licensed free software project implementing the GSM fixed network, including the various minimal necessary functionality of BSC, MSC, HLR.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Anatomy Of Smartphone Hardware

    In this webcast, the presenter will explain about the individual major building blocks and overall architecture of contemporary GSM and UMTS Smartphone. The presenter also explains the general block diagram level and then looks at actual chipsets used in mobile devices, ranging from SoC to RAM and flash memory technologies,...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Analyzing RFID Security

    RFID tags and contact-less smart cards are regularly criticized for their lack of security. While many RFID tags have weaknesses, the security level of different tags varies widely. Using the Mifare classic cards as an example, the presenter illustrate the complexity of RFID systems and discuss different attack vectors.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Short Attention Span Security

    In this webcast, the presenter will explain about script injection in flex, EFI Rootkits, static analysis with Dehydra, and pattern-matching hex editors, Auto-WEP key cracking with ITX, porting network security tools to the iPhone. Along with this, the presenter can make some code available for the hex editor, a bunch...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Android FakeID Vulnerability Walkthrough

    In this webcast, the presenter will present new Android vulnerability with widespread impact: a flaw in Android application handling, allowing malicious applications to escape the normal application sandbox and get special security privileges without any user notification.

    Provided By SecurityTube.net

  • Webcasts // Jul 2012

    On-demand Webcast: Protect and empower BYOD email

    Modern business is no longer tied to the desktop or the office. From Apple to BlackBerry, Android to Windows Phone, the rise of mobile devices has enabled people to access their business email, contacts and documents while on the go. But with the consumerization of IT and the Bring Your...

    Provided By Mimecast

  • Webcasts // Apr 2012

    MIT Sloan Africa Innovate - Panel - Mobile and Technology

    The growth in the mobile telecoms is considered a major factor in the strong growth rate in sub-saharan economies. Also the introduction of business, social and health solutions facilitated by the growing availability of mobile technologies show the potential for rapid transformation.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2014

    Exploiting Symbian

    SymbianOS is one of the major smart phone operating system and has been around for many years still exploitation has not been researched yet. The lack of proper exploitation techniques is mostly due to the fact that until the recent introduction of PIPS/OpenC (a POSIX API port) SymbianOS did not...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    RF Fingerprinting of RFID

    In this webcast, the presenter will present an overview of existing and their own novel methods for hacking electronic passports and driver's licenses including novel Radio Frequency (RF) fingerprinting techniques. High frequency proximity transponders (RFID tags) are already present in most new passports, and will soon be in new generations...

    Provided By SecurityTube.net