• 00:35

    WireLurker - Implications to Enterprise Mobile Security

    in Technology

    Earlier today a new form of malware was disclosed that is targeting iOS devices.  Our team found this particularly interesting as this highly sophisticated malware reportely can impact devices that are not jailbroken, it leverages rogue variants of popular applications and the malware uses code obfuscation to protect itself while taking advantage of mobile applications that are not obfuscated.


    We have quickly assembled a team of experts to talk about what we know about this new form of malware and the potential enterprise mobile security implications.

  • 00:05

    Unflod Baby Panda - iOS 7 Mobile Malware Can Steal Apple IDs

    in Software

    In this Lacoon Mobile Security Podcast series, Dan Koretsky, Sr Security Researcher and Strategist discusses the new strain of iOS mobile malware called "Unflod Baby Panda." Listen to learn more about this new mobile security malware, how a device can be infected and how to mitigate and remove the malware from your device. 


    To stay on top of the latest in mobile security news, subscribe to the Mobile Security Talk channel and check out the Lacoon Mobile Security blog at http://www.lacoon.com/blog/ . 


     


     

  • 00:09

    Is Android Fragmentation making the OS as fragile as glass?

    in Software

    What is Android fragmentation and how does it affect the mobile security of the Android-based devices? In this Mobile Security Talk episode, Dan Koretsky, sr. security researcher at Lacoon Security, provides us a brief overview of Android fragmentation and its security implications. 

  • 00:37

    The Latest In Voice Authentication Mobile Apps - Introducing "MyVoiceKeepass"

    in Technology

    We have been interviewing many people high level executives in the Voice Authentication field.  This is not surprising, as Voice Authentication is starting to be recognized as a very viable Biometric technology, and holds great promise for securing smartphones, tablets, netbooks, and all sorts of other wireless devices.  For instance, if you are in a rush, using fingeprint recognition may take longer than expected, and many people are still squeamish about having their irises scanned.  But with Voice Authentication, all you have to do is merely speak into your iPhone or Android device, and within a second or less, it will unlock for you.  In this radio show, we interview Mr. Brendan Treacy, CEO of VRAI Mobile, based out of the United Kingdom.  They have developed a very unique app called the 'MyVoiceKeepass", which protects your wireless device.  But more than that, along with Voice Authentication, you can use the other, various "unlocking" mechanisms this app possesses, thus, creating a totall safe and secure environment.  Find out more about this very unique app in this interview!

  • 00:28

    Mobile Apps under Attack – New Frontiers for Securing Mobile Applications

    in Technology

    In this podcast, Caleb talks with Jukka Alanen about how mobile apps are under attack, how apps are being exploited by hackers, and what organizations can do safeguard their brands, data, IP, and revenue while developing and releasing new mobile apps. Already 78% of Top 100 iOS and Android apps have been found as hacked, rogue versions, and industry organizations across OWASP, security consultancies, and analysts have started recommending new protection measures. Jukka Alanen is Vice President of Business Development and Corporate Strategy at Arxan Technologies, Inc, a security company that specializes in Application Protection. Recently, IBM and Arxan announced a new preventive security solution that extends the IBM portfolio to app hardening and run-time protection. 

  • 00:41

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 00:27

    Translating Mobile Security Strategy into Action

    in Technology

    In this podcast Caleb talks with mobile security guru Vijay Dheap about how to take a holistic approach to deploying mobile security solutions that safeguard the operational priorities of the business.

  • 00:05

    Are Malicious Configuration Profiles iOS' Achilles Heel?

    in Software

    The Lacoon Mobile Security Research team has been doing ongoing research into the subject of Malicious iOS Configuration Profiles for quite some time. To share this research, we are interviewing one of the senior security researchers at Lacoon Mobile Security, Dan Koretsky. We asked Dan to give some background data on iOS configuration profiles as well as discuss the potential threats to enterprises. Dan also provides us with methods that enterprises can take to mitigate the threats posed by malicious iOS configuration profiles.


    iOS Configuration Profiles are small files that can be installed on all iOS devices. They are essentially instruction and permission lists that can alter many settings, including network configurations and security settings. They’re used by everyone - from cell providers for their releasing their settings to thousands of enterprises for managing devices accessing the corporate network .


    Their use is officially approved by Apple and there is nothing innately malicious about any given profile. But, if implemented by threat actors, iOS configuration profiles can enable them to obtain usernames and passwords as well as allow access to secure corporate networks and private communications.  



     

  • 00:54

    Understanding The Israeli Perspective On Security

    in Technology

    As we all know, the typical market applications for Biometrics and related other related Security technologies falls primarily into four distinctive applications:


    1) Physical Access Entry;


    2) Time and Attendance;


    3) Single Sign On;


    4) Multimodal, or multi layered Biometric solutions.


    In this radio show, we have the privilege to speak with Mr. Arie Melamed Yekel, the Chief Marketing Officer of FST Biometrics, a leading Security firm based out of Israel.  Rather than trying to dominate all of the market spaces within Biometrics, FST Biometrics is dominant within the Physical Access Entry market.  From within this, they have developed cutting edge products and solutions which examines and confirms the identity of the entire individual, not just based from one Biometric modality.  Their unique technology fuses all aspects of Security, which include Facial Recognition, Voice Recognition, Behavioral Analytics, Visitor Management, License Plate Recognition, and high level Video Analytics. 

  • 00:08

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 00:41

    Enterprise Mobile Management and Security

    in Technology

    Mobile devices are rapidly becoming the end-point that drives business results.  With the increasing trends in “bring your own device” and mobile threats doubling in 2011 how do you responsibly embrace mobile while protecting your security and IT infrastructure?  In this podcast Caleb is joined by Bob Sutor, Vijay Dheap and Naveed Makhani to discuss the trends in mobile along with IBM’s intention to acquire Worklight.

Results Per Page: 12 | 24 | 48
Loading...
Loading...