SORT BY Relevancy
As a precursor to Lacoon Mobile Security's upcoming presentation at Blackhat 2014, we interivew Daniel Brodie, a Sr. Security Researcher at Lacoon to discuss some of the vulnerabilities that exist in Virtual Desktop Infrastructure (VDI) frameworks, as well as provide some insights into the implications of using VDI in your enterprise.
Daniel explains how while VDI solutions are certainly a beneficial tool to protect enterprises against device theft, they don’t provide protection against targeted threats such as mobile Remote Access Trojans (mRATs) and Man-in-the-Middle. In fact, as he shows in the research, threats against the underlying VDI platform are fairly easy to carry out by using widely-distributed free tools.
The podcast goes over the main topics that he’ll present at Blackhat, including the methods of research, potential threats and best practices that enterprises should follow.
In this Lacoon Mobile Security Podcast series, Dan Koretsky, Sr Security Researcher and Strategist discusses the new strain of iOS mobile malware called "Unflod Baby Panda." Listen to learn more about this new mobile security malware, how a device can be infected and how to mitigate and remove the malware from your device.
To stay on top of the latest in mobile security news, subscribe to the Mobile Security Talk channel and check out the Lacoon Mobile Security blog at http://www.lacoon.com/blog/ .
What is Android fragmentation and how does it affect the mobile security of the Android-based devices? In this Mobile Security Talk episode, Dan Koretsky, sr. security researcher at Lacoon Security, provides us a brief overview of Android fragmentation and its security implications.
The Lacoon Mobile Security Research team has been doing ongoing research into the subject of Malicious iOS Configuration Profiles for quite some time. To share this research, we are interviewing one of the senior security researchers at Lacoon Mobile Security, Dan Koretsky. We asked Dan to give some background data on iOS configuration profiles as well as discuss the potential threats to enterprises. Dan also provides us with methods that enterprises can take to mitigate the threats posed by malicious iOS configuration profiles.
iOS Configuration Profiles are small files that can be installed on all iOS devices. They are essentially instruction and permission lists that can alter many settings, including network configurations and security settings. They’re used by everyone - from cell providers for their releasing their settings to thousands of enterprises for managing devices accessing the corporate network .
Their use is officially approved by Apple and there is nothing innately malicious about any given profile. But, if implemented by threat actors, iOS configuration profiles can enable them to obtain usernames and passwords as well as allow access to secure corporate networks and private communications.
Mobile devices are rapidly becoming the end-point that drives business results. With the increasing trends in “bring your own device” and mobile threats doubling in 2011 how do you responsibly embrace mobile while protecting your security and IT infrastructure? In this podcast Caleb is joined by Bob Sutor, Vijay Dheap and Naveed Makhani to discuss the trends in mobile along with IBM’s intention to acquire Worklight.
There is no denying the natural attractiveness of being able to do whatever we want, whenever we want to. In technology, particularly lately, that has come to result in a trend to move as much of our technical toolset, formerly consigned to our desktop, and then our laptops, onto our truly mobile devices, most notably our phones. The amount of computing power that now fits in our pocket is worthy of the awe that it inspires, and the capacity to flirt with the full power of computing in such a compact package can be intoxicating.
As enterprises establish policies and practices to manage the security of all of this new capability and transportability, both risks and experiences are multiplying quickly. In this podcast, Caleb and Jack Danahy talk about the new challenges, and offer insights and advice that can help to raise awareness and better ensure the continuing protection of organizations in the new and transportable workplace.
Welcome to Security Radio. Your host James Hall with our No. 3 episode - a discussion about mobile phone security.
This evening we have with us the Chief Security Officer of FIXMO a provider of Mobile Risk Management services. Dan has been an information security professional for more than 15 years, and has worked for notable organizations such as XM Radio, Secure Computing, McAfee, Nominum, and Accuvant. He has extensive experience running security programs within the government segment; his most notable role was as Director of Network Security at the Transportation and Security Administration, which was the largest managed service contract within the federal government. Dan joined Fixmo in 2012 to drive security and technology innovation within Fixmo's suite of Mobile Risk Management solutions. In his role at Fixmo, he is directly responsible for global security and information assurance initiatives – researching trends, discovering security vulnerabilities and exploits, building strategic partnerships; and attaining industry certifications - as well as product innovation. Dan holds an M.S. in Information Assurance/Computer Forensics from Capitol College and a D.Sc in Information Assurance from Capitol College with a dissertation focus on enterprise smartphone security.
Security Radio thanks you for listening.
It's clear that mobile technology is changing the way we interact with one another, so it’s no surprise these changes extend to our love lives as well. In this week’s episode of Mobile Insights Radio with Steve Power Brown, Steve and guest Josh Fischer, mobile dating guru at Are You Interested (AYI.com), whether technology is helping busy singles connect, or whether the increasing use of mobile technology in our daily lives is making us ever more isolated. AYI.com is one of the largest social dating apps, with more than 58 million singles looking to make a love connection. Check out AYI.com’s blog, The Data of Dating, for more advice for singles looking for love.
SCHOOL SECURITY... AS THE YEAR BEGINS
THE NATIONAL ASSOCIATION OF SCHOOL RESOURCE OFFICERS
Mo Canady, Executive Director, about the recent NASRO conference and your safety readiness as the school year begins.
Michael Boyer, CFE, is CEO of AdSmart Inc., a company that provides local mobile advertising for franchise companies and their franchisees. He will join Deb Evans and Jack Monson, Wednesday July 10th to share 7 steps to ensure your mobile advertising campaign is successful!
AdSmart on the Web
Michael Boyer on LinkedIn, and Twitter
Deb Evans on LinkedIn and Twitter
Jack Monson on LinkedIn and Twitter
Let's discuss the social security issue and find out if that will be enough for you to lay it all down for late in life. Join the show at 10:00 am. Call (818)301-5834.
Join Host Live Chats
- High Frequency Radio Network (23 chatters)
- WGAG Radio (20 chatters)
- TXHXOXRX MINISTRY RADIO NETWORK (16 chatters)
- English Defence League Radio (11 chatters)
- Southern Sense Is Conservative (9 chatters)
- simonapple04 (8 chatters)
- Psychic Choice Radio (7 chatters)
- MRTALK (5 chatters)
- Bible News Radio (3 chatters)
- businessnegotiators1 (2 chatters)
- Charles Internatl House Music (2 chatters)
- Joeygiggles (2 chatters)
- May We Help You Radio Show (1 chatters)
- AdrianBernard (1 chatters)
- GRANNY GANJA (1 chatters)