Mobility

Smartphones, Bluetooth, WiFi, and other mobile technologies are driving the gig economy and changing the worlds of entertainment, communications, and computing. Stay ahead of the pack with these valuable white papers.

  • Untapped It Strategy webinar

    Webcasts // Dec 2015 // provided by Intuit

    Historically, Citizen Development has been broadly used to describe the value of non-IT employees within business application development. Gartner recently found that, “by 2020 at least 70% of large enterprises will have established successful Citizen Development policies, up from 20% in 2010. To date, most IT leaders have focused ...

    Watch Now
  • Building and Breaking Wireless Security

    Webcasts // Jan 2016 // provided by SecurityTube.net

    In this webcast, the presenter gives an overview on state-of-the-art wireless security concepts: how can the users' analyze wireless protocols? How can they build mechanisms that are secure even when the attacker has unlimited computational power? Can they exploit wireless transmission for more? Typically, wireless security is realized by implementing ...

    Watch Now
  • GPS Spoofing: Low-cost GPS Emulator

    Webcasts // Dec 2015 // provided by SecurityTube.net

    In this webcast, the presenters will introduce the basic GPS system principle, signal structure, mathematical models of pseudo-range and Doppler effect. The useful open source projects on Internet will be shared with attendees.

    Watch Now
  • Software Defined Radio Performance Trades and Tweaks

    Webcasts // Dec 2015 // provided by SecurityTube.net

    In this webcast, the presenter targeted at new and experienced Software Defined Radio (SDR) operators, developers and enthusiasts seeking a better end-to-end system understanding and anyone looking to maximize their SDR's performance. Commercially available SDRs (e.g. USRPs, RTL-SDRs, BladeRFs, etc.) are commonly used to fuzz wireless interfaces, deploy private cellular ...

    Watch Now
  • Covert Wireless Practical Hacker LPI LPD

    Webcasts // Dec 2015 // provided by SecurityTube.net

    Unlike commercial and consumer wireless, based on standards emphasizing cost, speed and interoperability, secure military and intel gear pays careful attention to Low Probability of Detection and Intercept (LPD/LPI) and traffic analysis.

    Watch Now
  • Guests n Goblins: Exposing Wi Fi Exfiltration Risks and Mitigation

    Webcasts // Dec 2015 // provided by SecurityTube.net

    Wi-Fi is a pervasive part of everyone's everyday life. Whether it be home networks, open hotspots at cafés, corporate networks or corporate guest networks they can be found virtually everywhere. Fortunately, for the security minded, some steps are taken to secure these weak points in one's infrastructure.

    Watch Now
  • Drive It Like You Hacked It: New Attacks and Tools to Wireles

    Webcasts // Dec 2015 // provided by SecurityTube.net

    In this webcast, the presenters will reveal new research and real attacks in the area of wirelessly controlled gates, garages and cars. Many cars are now controlled from mobile devices over GSM, while even more can be unlocked and ignitions started from wireless keyfobs over RF.

    Watch Now
  • Meeting People over WiFi

    Webcasts // Dec 2015 // provided by SecurityTube.net

    From day one when the people buy a piece of wireless technology, whether it's just a cell phone, laptop or a fitbit, they get a wireless signature. In this webcast, the presenter will talk about some of the things that can identify them in an environment and how people can ...

    Watch Now
  • USB Attack to Decrypt Wi Fi Communications

    Webcasts // Dec 2015 // provided by SecurityTube.net

    The term "Bad USB" has gotten some much needed press in last few months. There have been talks that have identified the risks that are caused by the inherent trust between the OS and any device attached by USB. The presenter found that most of the available payloads for the ...

    Watch Now
  • Introduction to SDR and the Wireless Village

    Webcasts // Dec 2015 // provided by SecurityTube.net

    In this webcast, the presenters will discuss the exploration and use of software defined radio from two perspectives; that of a security researcher and Ham radio operator. They will cover common uses and abuses of hardware to make them work like transceivers that the Ham crowed is use too, as ...

    Watch Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?