Software

TechRepublic covers the latest trends in software development and implementation.

  • Webcasts // Feb 2015

    Securing SMEs in an evolving threat landscape - Webinar

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • Webcasts // Jul 2014

    Top 5 Things Every C# Developer Should Know

    C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how you can gain deeper intelligence into your code to avoid critical crash causing defects. C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how...

    Sponsored By Coverity

  • Webcasts // Jul 2014

    5 Tips From Intuit For Implementing Static Code Analysis

    Poor software quality has become one of the most expensive topics in human history with costs exceeding $500 billion per year worldwide. However, 97% of software defects can be removed through code review, static analysis and unit testing. Learn how the implementation of static analysis at Intuit led to reduced...

    Sponsored By Coverity

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: Workday 20 Webinar

    Workday announces the arrival of Workday Big Data Analytics in Workday 2.0. Watch the webinar to learn how this powerful new application lets you combine Workday data with multiple non-Workday data sources to get more comprehensive insight and lets you run your business your way.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: Workday 21

    Workday 21 introduces a brand-new user experience with a clean, new look and even greater usability. With 246 new features and 67 of these coming from customer suggestions, this update demonstrates the continued influence our customers have in the development of Workday. Watch the webinar to learn more.

    Sponsored By Workday

  • Webcasts // Feb 2015

    Understanding a New Memory Corruption Defense: Use-After-Free (UAF) Mitigation and Bypass

    Memory corruption has plagued computers for decades. These software bugs can often be transformed into working cyber-attacks. High-level protections, such as anti-virus, have done little to stop the tide. Recent low-level protections such as non-executable memory and module randomization have helped.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    NACL: A New Crypto Library

    NaCl (pronounced \"Salt\") is a new easy-to-use high-speed software library for encryption, decryption, signatures, etc. NaCl's goal is to provide the entire core operations needed to build higher-level cryptographic tools. Of course, other libraries already exist for these core operations, but NaCl improves security, improves usability, and improves speed.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    The Windows Sandbox Paradox

    More user applications are relying on sandboxes to limit the damage remote code execution vulnerability can inflict. It started with Web browsers such as with Internet Explorer's protected mode and now covers many different applications. Unfortunately the Windows operating system isn't well matched to providing secure sandboxing.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    An Open Hardware and Software Platform, Based on the (Nominally) Closed-Source MT6260 SoC

    In this webcast, the presenter will introduce Fernvale, a reverse-engineered, open hardware and software platform based upon Mediatek's MT6260 value phone SoC. The MT6260 is the chip that powers many of the $10 GSM feature phones produced by the Shanzhai. Fernvale is made available as open-licensed schematics, board layouts, and...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Attacks on UEFI Security, Inspired by Darth Venamis's Misery and Speed Racer

    On modern Intel based computers there exist two powerful and protected code regions: the UEFI firmware and System Management Mode (SMM). UEFI is the replacement for conventional BIOS and has the responsibility of initializing the platform. SMM is a powerful mode of execution on Intel CPUs that is even more...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Finding the Weak Crypto Needle in a Byte Haystack

    Using the same stream cipher key twice is known to be a very bad idea, but keystream-resuse vulnerabilities are still very much a thing of the present - both in legitimate software and in the malware landscape. In this webcast, the presenter will describe a heuristic algorithm which can detect...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Cyber Necromancy - Reverse Engineering Dead Protocols

    Reverse engineering is not all binaries and byte-code. The black art also extends to networks and unobtainable game servers. In this webcast, the presenters will go into the gruesome details of how they dug through the graveyards of console binaries and mausoleums of forgotten network protocols in order to stitch...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Reproducible Builds - Moving Beyond Single Points of Failure for Software Distribution

    Software build reproducibility is the ability to use independent build machines to compile bit-identical binaries from program source code. In this webcast, the presenters will discuss the motivation for and the technical details behind software build reproducibility. They will describe the technical mechanisms used by the Tor project to produce.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Abusing Software Defined Networks

    Software Defined Networking (SDN) transfers all forwarding decisions to a single controller and provides the network with the same degree of control and flexibility as the cloud. And with all the major vendors onboard, it will soon be supporting networks everywhere. But current implementations are full of weaknesses that could...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Android Hacker Protection Level 0

    Have no fear, after drinking all the cheap wine two Android hackers has attacked all the protectors currently available for everyone's enjoyment! Whether the user have never reversed Android before or are a hardened veteran there will be something for the user, along with all the glorious PoC tools and...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Abuse of Blind Automation in Security Tools

    It is impossibly overwhelming for security personnel to manually analyze all of the data that comes to them in a meaningful way. Intelligent scripting and automation is key. This webcast aims to be a humorous reminder of why the word \"Intelligent\" really matters; the user's security devices might start doing...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Some Vulnerabilities are Different Than Others Studying Vulnerabilities and Attack Surfaces in the Wild

    The security of deployed and actively used systems is a moving target, influenced by factors not captured in the existing security metrics. For example, the count and severity of vulnerabilities in source code, as well as the corresponding attack surface, are commonly used as measures of a software product's security....

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Test Driven Security Testing

    As more and more businesses are moving to rapid application development frameworks, and methodologies. The presenter find that testing within these constructs to become more difficult due to shorter cycles, incomplete applications, limited staff and resources. How do they test within these frameworks leveraging existing people, and infrastructure to provide...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Security Model Bedfellows

    The penetration test finds a bug in the code that was coded four months ago and could have been prevented a year ago during requirements gathering. The vendor says they will fix it shortly after the software launches - if a change order is issued and they're paid for their...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Automatically Detecting Vulnerable Websites Before They Turn Malicious

    Significant recent research advances have made it possible to design systems that can automatically determine with high accuracy the maliciousness of a target website. While highly useful, such systems are reactive by nature. In this webcast, the presenter will take a complementary approach, and attempt to design, implement, and evaluate...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Epidemiology of Software Vulnerabilities: A Study of Attack Surface Spread

    Many developers today are turning to well established third-party libraries to speed the development process and realize quality improvements over creating an in-house proprietary font parsing or image rendering library from the ground up. Efficiency comes at a cost though: a single application may have as many as 100 different...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Digging for IE11 Sandbox Escapes Part 2

    In this webcast, the presenter undertake to find these vulnerabilities, giving time to go in-depth on how to investigate the IE11 sandbox, run the users own code and analyze the attack surface. Sample source code for all issues will be provided for use to allow the users to test the...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Exploiting Unpatched iOS Vulnerabilities for Fun and Profit

    Patching all vulnerabilities for a modern, complex software system (i.e., Windows, iOS) is often difficult due to the volume of bugs and response time requirements. Instead, software vendors usually devise quick workarounds to mitigate the exploitation of a given vulnerability. However, those patches are sometimes incomplete, and attackers can utilize...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Hacking the Wireless World with Software Defined Radio-2.0

    Wireless systems, and their radio signals, are everywhere: consumer, corporate, government, amateur - widely deployed and often vulnerable. If the users have ever wondered what sort of information is buzzing around them, in this webcast, the presenter will introduce how the user can dominate the RF spectrum by 'Blindly' analyzing...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Command and Control (C&C) Panels

    Bot herders deploy Command and Control (C&C) panels for commanding and collecting exfiltrated data from the infected hosts on the Internet. To protect C&C panels, bot herders deploy several built-in (software-centric) protection mechanisms to restrict direct access to these C&C panels.

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Time Trial - Racing Towards Practical Remote Timing Attacks

    Attacks on software become increasingly sophisticated over time and while the community has a good understanding of many classes of vulnerabilities that are commonly exploited, the practical relevance of side-channel attacks is much less understood. One common side-channel vulnerability that is present in many web applications today are timing side-channels...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Webcast: Maximize Database Performance

    Are you facing the pressure of not investing enough in database performance? In this on-demand webcast, see how poor performance negatively impacts your business, and how you can maximize database performance RIGHT NOW. Watch this webcast today.

    Provided By Dell Software

  • Webcasts // Sep 2014

    So You Want to Murder a Software Patent

    Software patents are a huge source of controversy and discussion in the tech world. This semi-hilarious legal story will cover the experience of the case, the details, and how the entire process went down. Hopefully some combination of entertainment, education and insight will ensue.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Node.JS as a Networking Tool

    Node.js is a library that provides non-blocking I/O for Google's V8 JavaScript engine. In this webcast, the presenter explores node's suitability for a diverse range of networking applications. Writing network applications with good concurrency and performance has been a very time consuming task in the past.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    CISO Perspectives: Aligning Secure Software Application Development with Business Interests

    Software security is first, and foremost, a business problem. Attackers have learned that nearly all web applications can be exploited via application-level vulnerabilities. Using any one of a long list of common entry points, an attacker can make the software misbehave in a variety of ways, including granting access to...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    BSIMM: A Decade of Software Security

    Now, at the end of a decade of great progress in software security, the way of measuring software security initiatives called the BSIMM. BSIMM is helping transform the field from an art into a measurable science. In this webcast, the presenter will provide an entertaining review of the software security...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    C+11 Metaprogramming Technics Applied to Software Obduscation

    Obfuscation is the transformation of source or binary code into a form that is difficult to understand, but without affecting the functionality of the code. Goals of obfuscation are multiple: hide a secret or logic, make code harder to reverse engineer, protect intellectual property, prevent tampering, etc.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

    Provided By Hewlett-Packard

  • Webcasts // Aug 2014

    On the Feasibility of Large-Scale Infections of iOS Devices

    While Apple iOS has gained increasing attention from attackers due to its rising popularity, very few large scale infections of iOS devices have been discovered because of iOS' advanced security architecture. In this webcast, the presenter will show that infecting a large number of iOS devices through botnets is feasible.

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    On-demand Webcast: Solve Complex Revenue Management Challenges

    For business professionals today, revenue management is an increasingly complicated proposition. Accountants and administrators are now responsible for managing multiple revenue sources and models, which requires a different level of data and analysis, plus powerful tools to successfully manage the complexities of the market and business operations. So how...

    Provided By Intacct

  • Webcasts // Aug 2014

    The Open Crypto Audit Project: Our Story

    Join the presenters for the story of the origins and history of the Open Crypto Audit Project (OCAP). OCAP is a community-driven global initiative which grew out of the first comprehensive public audit and cryptanalysis of the widely used encryption software TrueCrypt. Their charter is to provide technical assistance to...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Provided By Dell Software

  • Webcasts // Aug 2014

    Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces

    Graphical User Interfaces (GUIs) contain a number of common visual elements or widgets such as labels, text fields, buttons, and lists. GUIs typically provide the ability to set attributes on these widgets to control their visibility, enabled status, and whether they are writable. While these attributes are extremely useful to...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • Webcasts // Jul 2014

    5 Tips From Intuit For Implementing Static Code Analysis

    Poor software quality has become one of the most expensive topics in human history with costs exceeding $500 billion per year worldwide. However, 97% of software defects can be removed through code review, static analysis and unit testing. Learn how the implementation of static analysis at Intuit led to reduced...

    Sponsored By Coverity

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // Feb 2015

    Securing SMEs in an evolving threat landscape - Webinar

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // May 2014

    Webinar: Workday 20 Webinar

    Workday announces the arrival of Workday Big Data Analytics in Workday 2.0. Watch the webinar to learn how this powerful new application lets you combine Workday data with multiple non-Workday data sources to get more comprehensive insight and lets you run your business your way.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: Workday 21

    Workday 21 introduces a brand-new user experience with a clean, new look and even greater usability. With 246 new features and 67 of these coming from customer suggestions, this update demonstrates the continued influence our customers have in the development of Workday. Watch the webinar to learn more.

    Sponsored By Workday

  • Webcasts // Jul 2014

    Top 5 Things Every C# Developer Should Know

    C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how you can gain deeper intelligence into your code to avoid critical crash causing defects. C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how...

    Sponsored By Coverity

  • Webcasts // Aug 2014

    On-demand Webcast: Solve Complex Revenue Management Challenges

    For business professionals today, revenue management is an increasingly complicated proposition. Accountants and administrators are now responsible for managing multiple revenue sources and models, which requires a different level of data and analysis, plus powerful tools to successfully manage the complexities of the market and business operations. So how...

    Provided By Intacct

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Provided By Imperva

  • Webcasts // Feb 2006

    TechNet Webcast: Using InfoPath With Lotus Notes and Lotus Domino (Level 200)

    Using Microsoft Office InfoPath, information workers can collect, present, edit, and publish data. XML is at the heart of InfoPath and gives it versatility. What some of them may not know is that many of the features of InfoPath enable it to work with IBM Lotus Notes and IBM Lotus...

    Provided By Microsoft

  • Webcasts // Oct 2014

    Webcast: Maximize Database Performance

    Are you facing the pressure of not investing enough in database performance? In this on-demand webcast, see how poor performance negatively impacts your business, and how you can maximize database performance RIGHT NOW. Watch this webcast today.

    Provided By Dell Software

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Provided By Dell Software

  • Webcasts // Jun 2013

    The Role of Enterprise Content Management in Compliance

    Investments in Enterprise Content Management (ECM) solutions have been delayed by questions surrounding ROI. Without an effective information governance strategy, fueled by ECM technology, this uncertainty can be quickly overcome, especially with the exorbitant cost of penalties for non-compliance is examined. Dodd-Frank stresses the importance of transparency and good governance...

    Provided By Open Text

  • Webcasts // Sep 2014

    On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

    Provided By Hewlett-Packard

  • Webcasts // Jul 2013

    Monitorando Aplicações Móveis para um Novo Estilo de TI (Portuguese)

    Aplicações para dispositivos móveis são hoje uma forma viável para muitas empresas gerarem receitas, fidelização e satisfação de seus clientes. Pelo fato deste novo canal agregar valor ao negócio as empresas deveriam estar aptas a pro-ativamente monitorar, gerenciar e aperfeiçoar a experiência do usuário final com os serviços de aplicações...

    Provided By HP US

  • Webcasts // Feb 2014

    HP: Forrester Research: Application Management- Better Outcomes, Faster Results

    Conditioned by experiences with mobile and cloud-based software, customers are demanding faster responsiveness to their needs. Winning or losing customers now depends on your ability to remove delivery barriers so you can produce high-quality applications on demand. The race for customers is on—are you prepared to win? Join us...

    Provided By HP US

  • Webcasts // Feb 2014

    Forrester: Better Outcomes, Faster Results – A Path to Continuous Delivery

    Conditioned by experiences with mobile and cloud-based software, customers are demanding faster responsiveness to their needs. Winning or losing customers now depends on your ability to remove delivery barriers so you can produce high-quality applications on demand. The race for customers is on—are you prepared to win? Join us...

    Provided By HP US

  • Webcasts // Mar 2014

    Forrester: Better Outcomes, Faster Results – A Path to Continuous Delivery

    Conditioned by experiences with mobile and cloud-based software, customers are demanding faster responsiveness to their needs. Winning or losing customers now depends on your ability to remove delivery barriers so you can produce high-quality applications on demand. The race for customers is on—are you prepared to win? Watch this...

    Provided By HP US

  • Webcasts // Sep 2014

    C+11 Metaprogramming Technics Applied to Software Obduscation

    Obfuscation is the transformation of source or binary code into a form that is difficult to understand, but without affecting the functionality of the code. Goals of obfuscation are multiple: hide a secret or logic, make code harder to reverse engineer, protect intellectual property, prevent tampering, etc.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    So You Want to Murder a Software Patent

    Software patents are a huge source of controversy and discussion in the tech world. This semi-hilarious legal story will cover the experience of the case, the details, and how the entire process went down. Hopefully some combination of entertainment, education and insight will ensue.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Node.JS as a Networking Tool

    Node.js is a library that provides non-blocking I/O for Google's V8 JavaScript engine. In this webcast, the presenter explores node's suitability for a diverse range of networking applications. Writing network applications with good concurrency and performance has been a very time consuming task in the past.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Shameful Secrets of Proprietary Network Protocols

    There is a big bunch of tools offering HTTP/SSL traffic interception. However, when it comes to penetration tests of specialized embedded software or thick clients, the presenter often encounter proprietary protocols with no documentation at all.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Active Scan Augmenting Manual Testing with Attack Proxy Plugins

    In this webcast, the presenter will introduce ActiveScan++ and demonstrate how it can be used to easily identify complex vulnerabilities in real world applications. ActiveScan++ is an open source Python plugin that builds upon Burp Suite's basic active scanning functionality.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Getting New Actionable Insights by Analyzing Web Application Firewall Triggers

    ModSecurity web application firewall was first released more than a decade ago, available as open source software that gives the ability to protect web applications. Over the years ModSecurity has matured significantly, and is the most widely deployed WAF, protecting millions of websites. In this webcast, the presenter will show...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security Implications of the Cross-Origin Resource Sharing

    In this webcast, the presenter will analyze the Cross-Origin Resource Sharing (CORS). This HTML5 feature allows websites to load resources from other domains, even from restricted environments, using the authentication tokens saved by the browser.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Can Application Security Training Make Developers Build Less Vulnerable Code?

    In this webcast, the presenter will shares the results of a yearlong survey of nearly 600 software developers that captures their knowledge of application security before and after formal training. The presenter also explains the results of a \"Retest\" of a subset of respondents, to identify how much security knowledge...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Getting a Handle on Mobile Security

    Mobile development is one of the largest growth areas in all of software. The last decade has seen an explosion of mobile devices, operating systems, development environments, libraries, toolkits and app stores. Organizations are racing to construct mobile applications that harness the power of the mobile paradigm.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hybrid Analysis Mapping Making Security and Development Tools Play Nice Together

    Developers want to write code and security testers want to break it and both groups have specialized tools supporting these goals. The problem is - security testers need to know more about application code to do better testing and developers need to be able to quickly address problems found by...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Running Your Own GSM Network

    In this webcast, the presenter will mark the first public release of a new GPL licensed free software project implementing the GSM fixed network, including the various minimal necessary functionality of BSC, MSC, HLR.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Continuous Security Testing in a Devops World

    In this webcast, the presenter will present an open source security testing framework that aims to address them through the use of Behavior Driven Development (BDD). BDD offers a communication bridge between security, development and testing so that security requirements can be defined in a natural language; and yet still...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Command and Control (C&C) Panels

    Bot herders deploy Command and Control (C&C) panels for commanding and collecting exfiltrated data from the infected hosts on the Internet. To protect C&C panels, bot herders deploy several built-in (software-centric) protection mechanisms to restrict direct access to these C&C panels.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    CISO Perspectives: Aligning Secure Software Application Development with Business Interests

    Software security is first, and foremost, a business problem. Attackers have learned that nearly all web applications can be exploited via application-level vulnerabilities. Using any one of a long list of common entry points, an attacker can make the software misbehave in a variety of ways, including granting access to...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    BSIMM: A Decade of Software Security

    Now, at the end of a decade of great progress in software security, the way of measuring software security initiatives called the BSIMM. BSIMM is helping transform the field from an art into a measurable science. In this webcast, the presenter will provide an entertaining review of the software security...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Digging for IE11 Sandbox Escapes Part 2

    In this webcast, the presenter undertake to find these vulnerabilities, giving time to go in-depth on how to investigate the IE11 sandbox, run the users own code and analyze the attack surface. Sample source code for all issues will be provided for use to allow the users to test the...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Exploiting Unpatched iOS Vulnerabilities for Fun and Profit

    Patching all vulnerabilities for a modern, complex software system (i.e., Windows, iOS) is often difficult due to the volume of bugs and response time requirements. Instead, software vendors usually devise quick workarounds to mitigate the exploitation of a given vulnerability. However, those patches are sometimes incomplete, and attackers can utilize...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Hacking the Wireless World with Software Defined Radio-2.0

    Wireless systems, and their radio signals, are everywhere: consumer, corporate, government, amateur - widely deployed and often vulnerable. If the users have ever wondered what sort of information is buzzing around them, in this webcast, the presenter will introduce how the user can dominate the RF spectrum by 'Blindly' analyzing...

    Provided By SecurityTube.net

  • Webcasts // May 2012

    6.033: Computer Systems Engineering

    In this webcast, the presenter focuses on topics on the engineering of computer software and hardware systems: techniques for controlling complexity; strong modularity using client-server design, virtual memory, threads, privacy, security and encryption.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2013

    GTAC 2013: Breaking the Matrix - Android Testing at Scale

    Mobile has changed the way humans interact with computers. This is great, but as engineers they were faced with an ever growing matrix of environments their code runs on. The days of considering only a handful of browsers and screen resolutions are not coming back.

    Provided By Oleksiy Kovyrin

  • Webcasts // Jan 2014

    Contininuous Security Testing in a DevOps World

    In this webcast, the presenter explains about the BDD-security framework. Which is designed to solve some of these challenges by providing security teams and developers with the tools to: specify the security requirements in a human readable form, make those same requirements executable tests that can be run against a...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Vulnerability Discovery in Closed Source/Bytecode Encrypted PHP Applications

    Security audits of PHP applications are usually performed on a source code basis. However, sometimes vendors protect their source code by encrypting their applications with runtime (bytecode) encryptors. When these tools are used source code analysis is no longer possible and because these tools change how PHP works internally, several...

    Provided By SecurityTube.net