Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • Webcasts // Feb 2015

    Live Webcast: Mobile devices, wearables, and the future of identity

    For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and even all your private communications. Today, the very concept of digital identity is under fire. Every week, we read about a new...

    Sponsored By Centrify

  • Webcasts // Nov 2014

    On-demand Webcast: SaaS Apps? BYOD? Take Cloud Control

    Centrify User Suite Puts IT Back in the Driver’s Seat Cloud apps continue to find their way into enterprises, promising productivity but often causing headaches. Each app has its own set of login credentials for people to forget or re-use, IT has no centralized way to grant and revoke access...

    Sponsored By Centrify

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • Webcasts // Sep 2014

    ZDNet APAC webinar: Business Intelligence on the move

    Join us for this LIVE event! Monday, 29 September at 3pm Australian Eastern Standard Time Business Intelligence used to be the domain of the experts, with small crews of data analysts controlling the flow of business insights. But a great democratisation is unfolding and not only is Business Intelligence being...

    Sponsored By ZDNet

  • Webcasts // Jun 2014

    On-demand Webcast: Your Strategy at the Intersection of Cloud and Mobile

    We live in an enterprise world where Bring Your Own Device (BYOD) is a fait accompli and mobile is part of all of our lives. IT and mobility stakeholders continue to address ongoing changes with audiences, OS environments, data formats, coding methods, business processes and more. The case for investing...

    Sponsored By SAP

  • Webcasts // Jun 2014

    Financial Services Mobility Webinar brought to you by VMware and IDC

    What you will take away from the webinar: Perspective on today’s mobile financial enterprise Drivers and business imperatives for the growth of mobility Transformative nature of mobile innovation Style of IT that mobility brings to the financial enterprise

    Sponsored By VMware

  • Webcasts // Feb 2015

    Five Not-Totally-Crazy Ways to Build for Usability

    As security becomes an increasingly mainstream concern, the presenters are challenged with making their products easier to use. The presenter, CTO of the secure photo sharing app Glimpse, will share several highly effective (including some unconventional) ways technologists can make their products more user-friendly.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Knock Knock: A Survey of iOS Authentication Methods

    Almost all \"Interesting\" mobile applications don't exist in a vacuum. They rely on external systems for much of their data, and as such, frequently need a method for identifying and authenticating the application's user to the server. How this happens varies widely.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    There's Waldo! Tracking Users Via Mobile Apps

    Sure the users assume the NSA can track them, but due to insecure mobile apps, it may be possible for anyone else to track them too. Mobile apps often leverage user location data to provide a custom experience. Unfortunately, as their case studies show, this is often done insecurely, revealing...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Marco Cova: Combative Evasive Software

    In this webcast, the presenter research interests include most areas of systems security, with an emphasis on web-based malware analysis and detection, botnets, and vulnerability analysis. The presenter also led the design and development of Wepawet, a publicly-available service for the analysis of malicious web pages.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Plunder, Pillage and Print - The Art of Leverage Multifunction Printers During Penetration Testing

    In this webcast, the presenter will go beyond the common printer issues and focus around penetration testing of internal networks by focusing on embedded devices such as MultiFunction Printer (MFP). Discussing methods and techniques regularly used to plunder and pillage these devices for user credentials.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    OWASP Mobile Top Ten - Why They Matter and What We Can Do

    In this webcast, the presenter will examine the current OWASP mobile top ten security risks. They will briefly examine each one, and provide tangible reasons why they would be a concern for the users or their organization, as well as how to best secure against them.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    An Open Hardware and Software Platform, Based on the (Nominally) Closed-Source MT6260 SoC

    In this webcast, the presenter will introduce Fernvale, a reverse-engineered, open hardware and software platform based upon Mediatek's MT6260 value phone SoC. The MT6260 is the chip that powers many of the $10 GSM feature phones produced by the Shanzhai. Fernvale is made available as open-licensed schematics, board layouts, and...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    (In)Security of Mobile Banking

    In this webcast, the presenters will present a deep analysis of banking mobile apps available in the world. Based on static and dynamic analysis as well as on the analysis of the final source code they show that a vast majority of them are not respecting users' privacy and users'...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Karsten Nohl: Mobile Self-Defense

    The people know that mobile networks can - and do - attack them on many fronts. As this webcast will show, even 3G is attackable. It's high time that they upgrade from complaining to self-defense. Modern phones include all components necessary to block - or at least make visible -...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Manna From Heaven: Improving the State of Wireless Rogue AP Attacks

    The current state of theoretical attacks against wireless networks should allow this wireless world to be fully subverted for all but some edge cases. Devices can be fooled into connecting to spoofed networks, authentication to wireless networks can either be cracked or intercepted, and ability to capture credentials at a...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    NSA Playset GSM Sniffing

    A5/1, as implemented in GSM, was broken wide open in 2003, yet GSM is still the most widely used mobile communications protocol in the world. Introducing TWILIGHTVEGETABLE, the presenters' attempt to pull together the past decade of GSM attacks into a single, coherent toolset, and finally make real, practical, GSM...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Detecting Bluetooth Surveillance Systems

    Departments of transportation around the United States have deployed \"Little white boxes\" - Bluetooth detectors used to monitor traffic speeds and activity. While they're supposedly anonymous, they detect a nearly-unique ID from every car, phone, and PC that passes by.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Formal Analysis of Security Procedures in LTE

    The only part of the Long Term Evolution (LTE) security standard that has been formally analyzed is the Authentication and Key Agreement (AKA) procedure. It is not clear how well existing security related verification tools can handle other types of procedures. In this webcast, the presenter will use ProVerif to...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Run Away if You Can: Persistent Jamming Attacks Against Channel Hopping Wi-Fi Devices in Dense Networks

    Wireless Local Area Networks (WLANs) can adopt channel hopping technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals. Even though channel hopping technologies are effective against proactive types of jamming, it has been reported that reactive jammers could attack the targets...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Attacking Mobile Broadband Modems Like a Criminal Would

    While there has certainly been some interesting research into the security of mobile broadband modems, or \"Dongles\", in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Android FakeID Vulnerability Walkthrough

    In this webcast, the presenter will present new Android vulnerability with widespread impact: a flaw in Android application handling, allowing malicious applications to escape the normal application sandbox and get special security privileges without any user notification.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Cellular Exploitation on a Global Scale the Rise and Fall of the Control Protocol

    In this webcast, the presenter will discuss and disclose how over-the-air code execution can be obtained on the major cellular platforms and networks (GSM/CDMA/LTE). Including but not limited to Android, iOS, Blackberry, and embedded M2M devices. The listener will come away from this webcast, armed with detailed insight into these...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    It Just (Net)works the Truth About iOS 7's Multipeer Connectivity Framework

    With the release of iOS 7, Apple has quietly introduced a nifty feature called multipeer connectivity. Using a surprisingly small and simple set of APIs, developers can create applications that have the ability to discover and directly communicate with nearby iOS devices over Bluetooth or WiFi, without the need for...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Hacking Smart Phones

    In this webcast, the presenter will take a look at the Smartphone attack surface, only from and end-to-end point of view. The baseband type stuff and things owned by the telco's will not be covered. Basically, it'll cover 5 major areas: identifying operating systems (through for example the user-agent with...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Wideband GSM Sniffing

    GSM is still the most widely used security technology in the world with a user base of 5 billion and a quickly growing number of critical applications. 26C3's rainbow table attack on GSM's A5/1 encryption convinced many users that GSM calls should be considered unprotected.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Stealing a Mobile Identity Using Wormholes

    Authentication in mobile networks is usually done using a secure element which is commonly a sim-card. It is a tamper resistant device that should prevent cloning of mobile identities by legitimate users as well as attackers. Mobile network operators as well as most users have an interest in preventing the...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Secure Communications Below the Hearing Threshold

    In this webcast, the presenter will focus on hidden communications in VoIP and GSM in which voice data is typically compressed and transmitted in real-time. A framework has been developed to meet these requirements, providing interfaces for robust steganographic algorithms.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Android Geolocation Using GSM Network

    In this webcast, the presenter will introduce a new forensic technique that allows collecting users' past locations on most current Android phones, within a few seconds. It becomes possible to tell where the user was at a given time, or where a phone call took place over the last few...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    The Security of MDM (Mobile Device Management) Systems

    More and more corporate are deploying mobile devices like Smartphone's and pads. To manage these devices, several solutions are available like MobileIron, good technology, Symantec and several others. In this webcast, the presenter installed and studied two of these solutions from a security point of view. More precisely, if it...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

    Provided By Hewlett-Packard

  • Webcasts // Sep 2014

    The Business Value of Cloud-Managed Wireless Networks - IDC Webinar

    Cloud-managed Wi-Fi promises greater networking efficiencies and flexibility in managing, scaling and upgrading the wireless network. But cloud-managed Wi-Fi may not be the right solution for everyone. Watch this webcast to hear IDC analyst and Vice President, Rohit Mehra, discuss the critical factors to take into account as you...

    Provided By Hewlett-Packard

  • Webcasts // Aug 2014

    On the Feasibility of Large-Scale Infections of iOS Devices

    While Apple iOS has gained increasing attention from attackers due to its rising popularity, very few large scale infections of iOS devices have been discovered because of iOS' advanced security architecture. In this webcast, the presenter will show that infecting a large number of iOS devices through botnets is feasible.

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Take Mobility to New Heights with Mobile Workspaces

    In this webcast, the presenter will discuss about mobilize the user's business, the user need an end-to-end mobile workspace solution. Discover how Citrix Workspace Suite is the most complete solution powering mobile workspaces today and how the user can save up to 70%.

    Provided By Citrix Systems

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Provided By Dell Software

  • Webcasts // Jul 2014

    The New Cloud Framework: Best Practices for Enterprise Data

    The cloud is becoming the standard for enterprises, making it easier to manage mobility, BYOA, and data sprawl. The cloud’s accessibility and scalability makes it a natural solution to meet the needs of employees and still maintain control of corporate data. Yet the cloud has also introduced performance and privacy...

    Provided By Druva Software

  • Webcasts // Jul 2014

    A New Approach to Endpoint Data Protection

    The rising number of mobile workers makes endpoint data protection increasingly important for organizations of all types and sizes. Now more than ever, business and IT decision makers must take a holistic view that includes a wide variety of mobile devices including laptops, smartphones and tablets. But what is the...

    Provided By Druva Software

  • Webcasts // Jun 2014

    Breaking Through the Bottleneck : Mobile Malware Is Outbreak Spreading Like Wildfire

    In this webcast, the presenter explains about various advanced evasion techniques used by mobile malware to break the bottleneck of spreading. The presenter led both TrustGo security labs and security team for Chinese android app stores. They have seen plenty of mobile malware and malware technologies.

    Provided By SecurityTube.net

  • Webcasts // Jun 2014

    CopperDroid on the Reconstruction of Android Malware Behaviors

    Today mobile devices and their application marketplaces drive the entire economy of the mobile landscape. For instance, Android platforms alone have produced staggering revenues exceeding 9 billion USD, which unfortunately attracts cybercriminals with malware now hitting the Android markets at an alarmingly rising pace. To better understand this slew of...

    Provided By SecurityTube.net

  • Webcasts // May 2014

    On-demand Webcast: Beyond High Availability

    Information has become the lifeblood of most enterprises, and competitive advantage goes to those organizations that can make data available to decision-makers anytime, anywhere and in whatever context needed. This is often difficult to accomplish in today's siloed environments in which data is often maintained within legacy environments. In addition,...

    Provided By Dell Software