Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Jan 2014

    Address PCI Requirements with Symantec Critical System Protection

    Now-a-day's one of the biggest challenges are addressing the PCI requirements. In this the webcast the users' will learn how they can protect valuable cardholder data and meet PCI DSS compliance with Symantec Critical System Protection.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    TBS Internet: Securing EMEA with Symantec SSL

    In this webcast, the presenter discusses the value of Symantec's Website Security Solutions. The presenter also explains how they enable their customers to feel their data and online transactions are secure.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Introduction to SecureShare

    A peer-to-peer, end-to-end encrypted social networking framework. End-to-end encryption and decentralized social interaction is always a hassle. The presenter goal is to give developers an easy to use framework that hides the complexity of decentralized message passing, a distributed social graph and naturally embedded encryption.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Information Centric Networking

    In this webcast, the presenter will focuses on the security, privacy and censorship aspects of information centric networking. The presenter will also presents the information centric networking paradigm, a radically new networking paradigm for the future internet, which is being a hot topic in networking and future internet research fields.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    The EU approach to Cybersecurity and Cybercrime

    The EU directive on \"Attacks against information systems\" has raised some concerns among the hacker community. The presenter will give an overview of the policies and politics behind it, but also put it in the larger context of EU attempts to enhance cybersecurity and fight cybercrime from a critical insider...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hacking .NET Applications - The Black Arts

    In this webcast, the presenter will focus on attacking .NET desktop applications (EXE/DLL/Live Memory) both WhiteHat and BlackHat hacking will be shown on common security concerns such as intellectual property protection systems and licensing systems.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security and Anonymity Vulnerabilities in Tor

    There have been a number of exciting bugs and design flaws in Tor over the years, with effects ranging from complete anonymity compromise to remote code execution. Further, the academic research community has been coming up with increasingly esoteric and increasingly effective, attacks against all anonymity designs, including Tor.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hacking the iPhone

    Apple's iPhone has made a tremendous impact on the Smartphone market and the public consciousness, but it has also highlighted their desire to carefully control the device with draconian restrictions. These restrictions prevent users from choosing to run third-party applications unauthorized by Apple and using the devices on carriers not...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Improving Security by Avoiding Traffic and Still Get What You Want in Data Transfers

    Critical infrastructure systems are frequently constructed with components never designed for use in today's networked environment. While security conscious enterprises have extensive security mechanisms, these do not immediately transfer to many of the users' critical infrastructure networks. In this webcast, the presenter examines how to use the computer science concept...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    A Place to Hang Our Hats: Security Community and Culture

    Contrary to popular belief and media depictions, hacking is a social endeavor. In this webcast, the presenter explores the security and hacking culture from an historical context can tell the user about modern security issues.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Demystiphying and Fingerprinting the 802.15.4/Zigbee PHY

    In this webcast, the presenter explains about the methods of producing such IEEE 802.15.4 frames with commodity digital radio chips widely used in building inexpensive 802.15.4-conformant devices. Typically, PHY-layer fingerprinting requires software-defined radios that cost orders of magnitude more than the chips they fingerprint; however, their methods don't require a...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security Management without the Suck

    In this webcast, the presenter discuss about the real world techniques for implementing and optimizing a security program that they call RADIO (Recon, Analyze, Develop, Implement, Optimize). Conventional wisdom has historically presented guidance that works well in textbook scenarios or for very large companies but often does not integrate well...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Evading Code Emulation: Writing Ridiculously Obvious Malware that Evades AV

    Code emulation, a technology capable of detecting malware for which no signature exists. It's a powerful step in the right direction for client security, but it's a long way from mature. In this webcast, the presenter demonstrates how the code emulation engine in Anti-Virus Guard (AVG) can be reverse engineered...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Attacking Drupal: Hacking and Securing Drupal Web Applications

    Drupal is a very popular content management system that has been widely adopted by government agencies, major businesses, social networks, and more - underscoring why understanding how Drupal works and properly securing these applications is of the utmost importance.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Securing Sensitive Data: A Strange Game

    Information security compliance regulations like PCI, HIPAA, SB1386 have been around for many years now, but the users continue to suffer large data breaches. In this webcast, the presenter will discuss why even the best efforts at compliance fail to prevent breaches, provide examples from the field of what goes...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    The Savage Curtain

    In this webcast, the presenter explore strange of new apps, seek out new mobile SSL bugs and new SSL implementation flaws, to boldly go where no man has gone before. The presenter will also explain trek across the mobile landscape showing numerous mobile failures, related to encryption.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Invasive Roots Of Anti-Cheat Software

    Some of the most sophisticated rootkit behaviors are implemented by today's anti-cheat gaming software, in a constantly evolving game of cat and mouse. Game hackers often look for flaws in a system or program's logic, seeking to exploit them for their own performance gains.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Third Party Security Testing for Advanced Metering Infrastructure Projects

    Advanced Metering Infrastructure (AMI) program requires the introduction of many new devices and applications into a utility's infrastructure. Some of these devices and software may have never been deployed before anywhere in the world. Many are field deployed, outside of the utility's physical and cyber security perimeters.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    USB Write Blocking with USBProxy

    USB mass storage devices are some of the most common peripherals in use today. They number in the billions and have become the de-facto standard for offline data transfer. A USB write blocker may help to prevent some of these issues and allow researchers to examine the content of the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Anatomy of a Credit Card Stealing, RAM Scraping, POS Malware

    Credit card stealing RAM scraper malware is running amok compromising Point-Of-Sale (POS) systems. Recent breaches have shown that exposure to such attacks is high and there is a lot at risk. In this webcast, the presenter shows how the attack is carried out by looking at the nuts-and-bolts of a...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Virus, Malware, and Threats Oh My!?

    The current proliferation of malware and other threats have created an entire economy for cybercriminals; in today's world, the reality is that a determined adversary can always get in. In this webcast, the presenter will discuss tactics for detection and containment and includes a threat history review covering the last...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introducing Opabinia

    Checking for SSL issues form part of most infrastructure and web application assessments. However, these checks often are not detailed enough and can miss important issues. In this webcast, the presenter will introduce SSLAuditor4/Opabinia, a tool have automated SSL checks, making the task easier for the tester, while improving the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Run-Time Tools to Aid Application Security Assessments

    In this webcast, the presenter explains about the common tracing tools and their use in day-to-day application security assessments. The presenter also explains the run-time tracing concepts and their practical applications in real world testing scenarios.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Easy Ways to Bypass Anti Virus Systems

    Malicious software is all around the people. It permeates the Internet by riding on data transmissions. Once the user communicates, they risk getting in touch with malware (another name for malicious software). This is why every single one of the user, be it individual, company or organization, runs anti-virus software.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Honeywords: Detectable Password Theft

    Password theft is an ever increasing problem. One of the challenges of password theft is detecting it. A possible solution to this problem is the use of \"Honeywords\". In this webcast, the presenter examines the implementation of Honeywords, the effectiveness of it as a solution and how the concept can...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Why Information Security Should Be Important to All of Us

    In this webcast, the presenter tries to show how information security as an impact on all the people lives. The user's password and their identity, a company's repetition is all require good information security management, on an individual level.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    TCP Denial of Service Vulnerabilities

    The Transmission Control Protocol (TCP) is one of the fundamental protocols used in today's communication networks. Recently, there has been an increased discussion on possible Denial of Service (DoS) attacks against TCP-based services, which has largely been triggered by the partial disclosure of several vulnerabilities by the security company Outpost24....

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Attacking NFC Mobile Phones

    Near Field Communication (NFC) based services and mobile phones are starting to appear in the field, therefore it is time to take a look at the security of the services and especially the NFC mobile phones themselves.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Contininuous Security Testing in a DevOps World

    In this webcast, the presenter explains about the BDD-security framework. Which is designed to solve some of these challenges by providing security teams and developers with the tools to: specify the security requirements in a human readable form, make those same requirements executable tests that can be run against a...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    CSP Analysis - Attacking XSS Mitigation

    In this webcast, the presenter will given an introduction into the \"Content Security Policy (CSP)\" HTTP header. The CSP is basically an HTTP header it requests the site and gets response from server. It allows loading sources like java script files, style sheet and images etc.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cisco IOS Attack and Defense

    In this webcast, the presenter covers the past, present and future of Cisco IOS hacking, defense and forensics. Starting from the historic attacks that still work on less well managed parts of the internet, the powerful common bugs, the classes of binary vulnerabilities and how to exploit them down to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Vulnerability Discovery in Closed Source/Bytecode Encrypted PHP Applications

    Security audits of PHP applications are usually performed on a source code basis. However, sometimes vendors protect their source code by encrypting their applications with runtime (bytecode) encryptors. When these tools are used source code analysis is no longer possible and because these tools change how PHP works internally, several...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    An Introduction to New Stream Cipher Designs

    Even with \"Nothing to hide\", the user want to protect the privacy of their bits and bytes. Encryption is an important tool for this, and stream ciphers are a major class of symmetric-key encryption schemes. Algorithms such as RC4 (used in WEP/WPA, BitTorrent, SSL), A5/1 (GSM telephony), E0 (Bluetooth), as...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Full-Disk-Encryption Crash-Course

    Full-Disk-Encryption (FDE) is an important aspect of data security and everyone should use an appropriate solution to protect their (especially mobile) systems and data. In this webcast, the presenter covers the technology behind Full-Disk-Encryption (FDE) software products.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    RF Fingerprinting of RFID

    In this webcast, the presenter will present an overview of existing and their own novel methods for hacking electronic passports and driver's licenses including novel Radio Frequency (RF) fingerprinting techniques. High frequency proximity transponders (RFID tags) are already present in most new passports, and will soon be in new generations...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Methods for Understanding Targeted Attacks with Office Documents

    In this webcast, the presenter will give an overview about the office file format. The presenter also explains the in-depth technical details and practical analytical techniques for triaging and understanding these attacks, defensive mechanisms to reduce the effectiveness of the attacks, forensics evidence that can help trace the attacks, static...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security Failures in Smart Card Payment Systems

    PIN Entry Devices (PEDs) are used in the Chip & PIN (EMV) system to process customers' card details and PINs in stores world-wide. Because of the highly sensitive information they handle, PEDs are subject to an extensive security evaluation procedure.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Attacking Rich Internet Applications

    In this webcast, the presenter will examine the largely under researched topic of Rich Internet Applications (RIAs) security in the hopes of illustrating how the complex interactions with their executing environment, and general bad security practices, can lead to exploitable applications.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Intent on Being a Good Android Citizen?

    Securing intents properly requires a defensive approach of some old techniques plus an added step of validating some assumptions. In this webcast, the presenter aimed mainly for app developers - learn how intents work under the hood, how to secure the user intents and how to secure their assumptions to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Active Scan Augmenting Manual Testing with Attack Proxy Plugins

    In this webcast, the presenter will introduce ActiveScan++ and demonstrate how it can be used to easily identify complex vulnerabilities in real world applications. ActiveScan++ is an open source Python plugin that builds upon Burp Suite's basic active scanning functionality.

    Provided By SecurityTube.net