Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Mobile Security
YouTube
education
#Mobile Device Security
#IMSI Catchers
Showing:
346
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
HackerOne
Hacker101
0
rewiews
Learn essential bug bounty hunting skills through comprehensive video tutorials covering web security, exploitation techniques, and ethical hacking practices.
Add to list
27
Lesons
4 hours 30 minutes
On-Demand
Free-Video
Great Learning
Types of Cyber Security
0
rewiews
Explore various cybersecurity types including network, information, application, cloud, IoT, and mobile security. Learn their importance, implementation, and industry applications.
Add to list
12
Lesons
32 minutes
On-Demand
Free-Video
Great Learning
Ethical Hacking Tutorial for Beginners in Hindi - Kali Linux
0
rewiews
Great Learning brings you this beginner-friendly tutorial on Ethical Hacking to take you from the starting point through the finishing point of everything you need to know about this domain and getting started on the journey to master it.
Add to list
14
Lesons
1 hour 55 minutes
On-Demand
Free-Video
TEDx
Cybersecurity: How to Avoid Online Scams
0
rewiews
资深网络安全专家剖析常见诈骗手法,分享实用防范措施。学习识别风险、掌握资讯,培养警惕性,有效降低成为网络诈骗受害者的风险。
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Mobile Hacking 101 - A Cross-Platform Audit Journey
0
rewiews
Descubre técnicas y herramientas para auditar la seguridad de aplicaciones móviles multiplataforma, identificando riesgos y vulnerabilidades en prácticas de programación deficientes.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
media.ccc.de
Introduction to Smartphone Malware Forensics
0
rewiews
Überblick über Techniken und Open-Source-Tools zur Erkennung von Malware auf iOS- und Android-Smartphones, mit Fokus auf Stalkerware und Staatstrojaner. Praktische Einführung in einvernehmliche Smartphone-Forensik.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Masterclass: Ingeniería Social y Seguridad Móvil
0
rewiews
Explora los fundamentos de la ingeniería social y su conexión con la seguridad móvil. Aprende tácticas de manipulación psicológica y amenazas en dispositivos móviles para proteger datos sensibles.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
DefCamp
Complex Bank Card Smishing Attack Exploiting Posta Romana's Image - DefCamp Cluj-Napoca 2024
0
rewiews
Análisis detallado de un sofisticado ataque de smishing bancario que aprovecha la imagen de Posta Romana, revelando técnicas y contramedidas para mejorar la seguridad cibernética.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Ekoparty Security Conference
La lucha contra el auge de la inteligencia artificial - BOT-Apocalypse Now
0
rewiews
Estrategias para combatir ataques BOT en la era de la IA, enfocándose en amenazas móviles, reducción de costos WAF y protección contra fraudes, DDoS y abusos de API.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
media.ccc.de
Staatliche Überwachung: Erfahrungen und Beispiele aus der Praxis
0
rewiews
Erfahre, wie staatliche Überwachung funktioniert und wie du dich als Aktivist*in schützen kannst. Lerne über Rechtsgrundlagen, technische Umsetzung und Gegenmaßnahmen.
Add to list
1
Lesons
1 hour 25 minutes
On-Demand
Free-Video
DevSecCon
Dynamic Analysis of Complex Mobile Applications
0
rewiews
Aprenda a realizar análisis de seguridad en aplicaciones móviles complejas, superando protecciones criptográficas y encontrando vulnerabilidades mediante herramientas como Frida, Burp Suite y Brida.
Add to list
1
Lesons
1 hour 13 minutes
On-Demand
Free-Video
Open Data Science
Cybersecurity and Policing in the Metaverse
0
rewiews
Explore cybersecurity challenges in the Metaverse with Jack McCauley. Learn about potential threats, privacy risks, and how AI can combat cyberattacks in virtual environments.
Add to list
11
Lesons
35 minutes
On-Demand
Free-Video
SecurityFWD
Hacking Smartphones with QR Codes
0
rewiews
Explore smartphone vulnerabilities through QR codes, learning to embed Wi-Fi backdoors, track targets, and hijack data connections. Gain insights into hidden networks, tracking techniques, and rogue access points.
Add to list
8
Lesons
1 hour 6 minutes
On-Demand
Free-Video
IEEE
SmarPer- Context-Aware and Automatic Runtime-Permissions for Mobile Devices
0
rewiews
Explores context-aware, automatic runtime permissions for mobile devices, using machine learning to predict user decisions and offering data obfuscation options to balance privacy and utility.
Add to list
12
Lesons
23 minutes
On-Demand
Free-Video
IEEE
Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices
0
rewiews
Explore physical-layer BLE location tracking attacks on mobile devices, examining privacy risks, hardware imperfections, and real-world tracking experiments.
Add to list
9
Lesons
22 minutes
On-Demand
Free-Video
IEEE
SensorID - Sensor Calibration Fingerprinting for Smartphones
0
rewiews
Exploring smartphone sensor calibration fingerprinting as a novel device identification method, demonstrating high effectiveness and potential privacy implications for iOS and Android users.
Add to list
8
Lesons
19 minutes
On-Demand
Free-Video
IEEE
Inferring User Routes and Locations Using Zero-Permission Mobile Sensors
0
rewiews
Explore zero-permission mobile sensor vulnerabilities for inferring user routes and locations, highlighting privacy risks and proposing detection methods through maximum likelihood route identification.
Add to list
13
Lesons
22 minutes
On-Demand
Free-Video
IEEE
Effective Real-Time Android Application Auditing
0
rewiews
Innovative approach combining static and dynamic analysis for efficient, real-time Android app auditing to detect data leaks, offering improved speed and accuracy over existing methods.
Add to list
12
Lesons
22 minutes
On-Demand
Free-Video
Bugcrowd
iPhone Baseband Research and Reversing - Security Insights and Techniques
0
rewiews
Explore iPhone baseband internals, research techniques, and tools for firmware analysis, reversing, and exploitation. Gain insights into Qualcomm baseband architecture and vulnerabilities.
Add to list
22
Lesons
48 minutes
On-Demand
Free-Video
Bugcrowd
Identifying & Avoiding Android App Protections - Tim Strazzere, LevelUp 2017
0
rewiews
Techniques for quickly identifying and bypassing Android app protections to improve bug bounty hunting efficiency and ROI.
Add to list
18
Lesons
33 minutes
On-Demand
Free-Video
Bugcrowd
Advanced Android Bug Bounty Skills - Ben Actis, Bugcrowd's LevelUp 2017
0
rewiews
Explore advanced Android bug bounty techniques, focusing on IPC vulnerabilities, mobile-specific issues, and leveraging web hacking skills for mobile security testing.
Add to list
27
Lesons
51 minutes
On-Demand
Free-Video
Bugcrowd
Reverse Engineering iOS Mobile Apps
0
rewiews
Introduction to iOS mobile app reverse engineering, covering specific tools and techniques. Includes demonstration on a popular app and advanced usage examples.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Bugcrowd
Car Hacking Explained for Bug Hunters - Automotive Security Vulnerabilities and Methodologies
0
rewiews
Explore automotive security vulnerabilities, from IoT to CAN bus hacking. Learn methodologies, attack surfaces, and bug prioritization for car hacking, covering infotainment systems, APIs, and mobile apps.
Add to list
20
Lesons
37 minutes
On-Demand
Free-Video
NahamSec
Hacking, Content Creation, and API Security with TheXSSRat
0
rewiews
Insightful discussion on hacking, content creation, and API security with TheXSSRat. Covers career paths, learning strategies, and practical tips for aspiring cybersecurity professionals.
Add to list
28
Lesons
1 hour 15 minutes
On-Demand
Free-Video
NahamSec
VirSecCon 2020 - Cybersecurity Conference on Bug Bounty, Mobile, Web, and Reconnaissance
0
rewiews
Comprehensive cybersecurity conference featuring expert talks on bug bounty, mobile security, web hacking, and reconnaissance. Gain insights from industry leaders and enhance your ethical hacking skills.
Add to list
13
Lesons
6 hours 59 minutes
On-Demand
Free-Video
Infosecurity Europe
Evolving Cyber Threat Landscape: From Mobile Apps to Social Engineering
0
rewiews
Comprehensive overview of evolving cyber threats, from app-based risks to social engineering, emphasizing the importance of human education in strengthening organizational cybersecurity defenses.
Add to list
8
Lesons
28 minutes
On-Demand
Free-Video
LASCON
Enterprise-Wide Multi-Factor Authentication: Beyond Passwords - 2017
0
rewiews
Explore enterprise-wide multi-factor authentication deployment, focusing on passwordless solutions for secure, flexible access across devices and work scenarios. Learn technical challenges and user experience considerations.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
LASCON
Mobile Security Testing and Penetration Techniques - 2017 Keynote
0
rewiews
Insightful keynote address exploring cutting-edge cybersecurity trends, challenges, and innovations in the rapidly evolving digital landscape.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Mobile App Privacy Analysis at Scale
0
rewiews
Exploring privacy risks in mobile apps: automated analysis of 80,000+ Android apps reveals widespread tracking, data sharing, and potential regulatory violations. Discusses implications for developers, platforms, and regulators.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
LASCON
Easy Mobile Hacking: Native and Hybrid Pitfalls - 2016
0
rewiews
Uncover common vulnerabilities in mobile apps, both native and hybrid, using free tools. Learn to identify and exploit configuration weaknesses across Android and iOS platforms.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
LASCON
Practical iOS Reverse Engineering - Beyond the Script
0
rewiews
Explore advanced iOS reverse engineering techniques, including binary patching and MACH-0 reversing, to uncover hidden vulnerabilities and bypass jailbreak detection in mobile applications.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
White Hat Cal Poly
Mobile Security - Jasper Kahn
0
rewiews
Explore mobile security history, vulnerabilities, and legal aspects of rooting devices. Learn about exploits, fake app stores, and critical bugs affecting Android and iOS.
Add to list
12
Lesons
29 minutes
On-Demand
Free-Video
White Hat Cal Poly
IMSI Catchers - Maria Pikusova
0
rewiews
Explore IMSI Catchers: cell phone communication interceptors. Learn about their history, uses, detection methods, and legal implications. Discover an open-source app for identifying these devices.
Add to list
17
Lesons
24 minutes
On-Demand
Free-Video
Start with the BPT Then Worry About the APT - Lecture 1
0
rewiews
Explore essential cybersecurity strategies, from basic protection techniques to advanced memory analysis, covering various systems and devices for comprehensive digital defense.
Add to list
13
Lesons
38 minutes
On-Demand
Free-Video
New Challenges on Mobile Security - From MDM to MAM
0
rewiews
Explore new challenges in mobile security as the industry shifts from MDM to MAM, with insights on emerging threats and protection strategies.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
App Wrapping - What Does That Even Mean? - Lecture 202
0
rewiews
Explore app wrapping technology, its applications in mobile security, and its impact on enterprise mobility management strategies.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Leveraging Mobile Devices on Pentests - OISF 2013
0
rewiews
Learn to leverage mobile devices in penetration testing with expert Georgia Weidman. Discover techniques and strategies for enhancing security assessments using smartphones and tablets.
Add to list
1
Lesons
1 hour 1 minute
On-Demand
Free-Video
Android Phone Rooting - Techniques and Implications
0
rewiews
Learn to root Android phones, unlock hidden features, and enhance device capabilities. Explore techniques for customizing and optimizing your Android experience.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
Social Zombies: Rise of the Mobile Dead
0
rewiews
Explore the rise of mobile vulnerabilities and social engineering threats in this insightful presentation on cybersecurity challenges in the mobile era.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Introducing the Smartphone Pentest Framework
0
rewiews
Explore the Smartphone Pentest Framework, a cutting-edge tool for mobile security testing, and learn how to assess vulnerabilities in smartphone applications and networks.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
Securing Mobile Devices for Companies and Vendors - Outerz0ne 2011
0
rewiews
Comprehensive overview of mobile device security challenges and best practices for companies and vendors, covering email, network security, rogue apps, and platform-specific considerations.
Add to list
18
Lesons
42 minutes
On-Demand
Free-Video
BruCON Security Conference
Attack Surface and Security Implications of eSIM Technology
0
rewiews
Explore the security vulnerabilities and potential risks associated with eSIM technology in mobile phones and desktop devices, raising awareness about offensive operations and post-compromise scenarios.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
BruCON Security Conference
The Mobile Malware Maze - 15 Years of Evolution
0
rewiews
Explore the 15-year evolution of mobile malware, from Symbian OS to Android, examining shifting trends and current threats in this comprehensive keynote on mobile security.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
Endpoint Security Decisions in the Age of Consumerization and Mobile Devices
0
rewiews
Explore key decisions for managing endpoint risk in the era of consumerization and mobile devices, balancing security with innovation and user experience.
Add to list
1
Lesons
1 hour 20 minutes
On-Demand
Free-Video
OWASP Foundation
Mobile-First Websites Security Evaluation - Attacker-Friendly or User-Friendly?
0
rewiews
Evaluate security vulnerabilities in mobile-first websites, exploring potential risks and attacker-friendly features. Learn to identify and mitigate threats in mobile web development.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
OWASP Foundation
The Perimeter Has Been Shattered - Mobile and IoT Security Challenges
0
rewiews
Explore how mobility and IoT have disrupted traditional enterprise security, examining new threats and the limitations of current defenses. Learn practical strategies to improve mobile and IoT security in the modern landscape.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
OWASP Foundation
The Less Hacked Path - Exploring Modern Security Vulnerabilities
0
rewiews
Explore fascinating side-channel attacks and low-cost tools used against modern technology. Learn about innovative hacking methods and how to secure against them from renowned security researcher Samy Kamkar.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
OWASP Foundation
How to Steal Mobile Wallet - Security Risks and Mitigation Strategies
0
rewiews
Explores vulnerabilities in mobile contactless payments, demonstrating card cloning and discussing attack vectors, risks, and mitigation strategies for secure mobile wallet implementation.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
OWASP Foundation
Combining Security Risks of Native and Web Development in Hybrid Apps - AppSec EU 2017
0
rewiews
Explore security risks in hybrid app development, combining native and web technologies. Learn defensive programming and testing strategies for secure cross-platform mobile applications.
Add to list
20
Lesons
37 minutes
On-Demand
Free-Video
OWASP Foundation
Fast Forwarding Mobile Security with the Mobile Security Testing Guide
0
rewiews
Explore mobile security advancements and best practices using the Mobile Security Testing Guide (MSTG) in this comprehensive OWASP presentation.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
OWASP Foundation
Threat Modeling for Mobile Applications
0
rewiews
Explore threat modeling techniques for mobile applications with expert Amit Sethi. Learn to identify and mitigate security risks in mobile development.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
OWASP Foundation
Eliminating Passwords for Enhanced Security - APPSEC CA 2017
0
rewiews
Explore password elimination for enhanced security. Learn about device fingerprinting, dynamic mobile authentication, and innovative approaches to secure login without traditional passwords.
Add to list
19
Lesons
47 minutes
On-Demand
Free-Video
OWASP Foundation
Understanding the API Attack Vector - How Attackers Exploit Application Communications
0
rewiews
Explore attacker techniques for targeting API-driven applications, including code manipulation, mobile vulnerabilities, and advanced attacks. Learn strategies to secure apps in cloud-native environments.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
OWASP Foundation
Secure Messengers and Man in the Contacts Attack
0
rewiews
Explore the Man in the Contacts attack, its implementation in a mobile game, and its potential for spear phishing in secure messaging apps. Learn about vulnerabilities and possible mitigations.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
OWASP Foundation
Secure Coding Lessons for Mobile Apps - Insights from the Trenches
0
rewiews
Explore common mobile app coding pitfalls, their real-world impacts, and learn effective strategies to enhance security. Includes demonstrations of attacker techniques and protective code samples.
Add to list
9
Lesons
31 minutes
On-Demand
Free-Video
OWASP Foundation
Pwning WhatsApp - The Dark Side of Web-based Messaging Apps
0
rewiews
Explore vulnerabilities in web-based messaging apps, focusing on WhatsApp. Learn about potential security risks and exploitation techniques in popular communication platforms.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
OWASP Foundation
Practical Mobile App Attacks By Example
0
rewiews
Explore real-world mobile app vulnerabilities and attack techniques through hands-on demonstrations, enhancing your understanding of mobile security risks and defense strategies.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
OWASP Foundation
Philosophizing Security in a Mobile-First World
0
rewiews
Explore security challenges and strategies in a mobile-centric world, examining philosophical approaches to safeguarding applications and data in the era of ubiquitous mobile devices.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
OWASP Foundation
Firefox OS Security Model and Design Considerations
0
rewiews
Explore Firefox OS security model and design considerations with Mozilla's Security Assurance team lead. Learn about building a mobile OS using browser technologies.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
OWASP Foundation
SSL Traffic Interception on Mobile Devices - Analysis and Protection
0
rewiews
Análisis detallado de incidentes SSL en aplicaciones móviles, revelando patrones globales, casos notables y soluciones para desarrolladores contra la interceptación de tráfico.
Add to list
16
Lesons
52 minutes
On-Demand
Free-Video
OWASP Foundation
Integrating Mobile Devices into Penetration Testing Programs
0
rewiews
Explore techniques for assessing mobile device security risks in enterprise environments, including phishing, undermining controls, and using compromised devices as pivot points.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
OWASP Foundation
Radio Hacking - Cars, Hardware, and More
0
rewiews
Explore radio hacking techniques for wirelessly controlled devices like gates, garages, and cars. Learn about tools, vulnerabilities, and protective measures in this comprehensive introduction to RF security.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
OWASP Foundation
SPArring with the Security of Single Page Applications - MMA Hacker Training
0
rewiews
Explore security challenges in Single Page Applications through an MMA analogy. Learn about SPA frameworks, REST APIs, WebSockets, and interconnectivity to become a "Mixed Multilayer Application Hacker".
Add to list
22
Lesons
56 minutes
On-Demand
Free-Video
OWASP Foundation
If 6,000 Mobile Malware Applications Could Talk - Analyzing Malware Behavior and Trends
0
rewiews
Explore insights from analyzing 6,000 mobile malware apps, covering distribution, behavior, fingerprinting, and common characteristics. Learn about APK scanning and permission requests.
Add to list
32
Lesons
42 minutes
On-Demand
Free-Video
OWASP Foundation
Adaptive Testing Methodology: Crowdsourced Testing for Customized Target Stack
0
rewiews
Discover an efficient, customizable pentesting methodology that adapts to specific technology stacks and time constraints, improving consistency and effectiveness in vulnerability detection.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
OWASP Foundation
Why Using SMS in Authentication is Risky and Better Alternatives - AppSecUSA 2016
0
rewiews
Explore limitations of SMS-based authentication and discover more secure alternatives using push notifications for improved user experience and enhanced security in two-factor authentication.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
OWASP Foundation
HTTPS and TLS Security Practices - Front Line Insights 2016
0
rewiews
Comprehensive overview of modern HTTPS and TLS security practices, covering protocol vulnerabilities, certificate fundamentals, and best practices for implementing strong encryption in web services.
Add to list
1
Lesons
1 hour 1 minute
On-Demand
Free-Video
OWASP Foundation
Modern Malvertising and Malware Web-Based Exploit Campaigns
0
rewiews
Explore modern malvertising and web-based exploit campaigns, including top malware types, real-world attack breakdowns, and emerging threats in this technical presentation on cybersecurity.
Add to list
26
Lesons
55 minutes
On-Demand
Free-Video
OWASP Foundation
When Geo Goes Wrong - A Case Study of Geolocation Vulnerabilities in Mobile Apps
0
rewiews
Exploring geolocation vulnerabilities in mobile apps, focusing on a dating app case study. Discusses common bugs, attack methods, and best practices for secure location-aware app development.
Add to list
27
Lesons
35 minutes
On-Demand
Free-Video
OWASP Foundation
Everything You Need to Know About Certificate Pinning - AppSecEU 2016
0
rewiews
Comprehensive guide to certificate pinning: implementation, benefits, and potential pitfalls. Essential knowledge for enhancing mobile app security and protecting against man-in-the-middle attacks.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
OWASP Foundation
Security Testing Windows Store Apps
0
rewiews
Explore security testing for Windows Store Apps, focusing on HTML/JavaScript development, architecture, and potential vulnerabilities in this emerging application model.
Add to list
32
Lesons
47 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP Mobile Top Ten 2014 - The New Lack of Binary Protection Category
0
rewiews
Explore the new OWASP Mobile Top Ten category: lack of binary protections. Learn about risks to mobile apps, their impact on the app economy, and strategies to mitigate these threats on iOS and Android platforms.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
OWASP Foundation
Getting a Handle on Mobile Security
0
rewiews
Comprehensive overview of mobile security challenges and best practices, covering encryption, data protection, and platform-specific concerns for developers building secure mobile applications.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
OWASP Foundation
Security Management and Training - OWASP AppSec Europe 2014
0
rewiews
Comprehensive security conference covering threat intelligence, JavaScript crypto, mobile/web security education, HTML5 security, CISO insights, PCI DSS, and Android malware analysis.
Add to list
9
Lesons
9 hours 35 minutes
On-Demand
Free-Video
OWASP Foundation
Mobile Security Track - AppSec Europe 2014
0
rewiews
Explore cutting-edge mobile security topics at AppSecEU 2014, covering iOS and Android vulnerabilities, OWASP Mobile Top Ten, smart storage scanning, and practical defense strategies for app developers.
Add to list
6
Lesons
6 hours 26 minutes
On-Demand
Free-Video
OWASP Foundation
Building Secure Containers for Mobile Devices
0
rewiews
Explore secure container solutions for BYOD environments, covering application wrapping, design challenges, iOS runtime analysis, and implementation best practices for mobile data protection.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
OWASP Foundation
PiOSoned POS - A Case Study in iOS-Based Mobile Point-of-Sale Security Flaws
0
rewiews
Explore security vulnerabilities in iOS-based mobile point-of-sale systems, including coding mistakes, platform misunderstandings, and hardware weaknesses. Learn best practices for securing mobile POS applications.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
OWASP Foundation
Mobile Security Attacks - A Glimpse from the Trenches
0
rewiews
Explore emerging mobile security threats, from physical to network and application levels, with real-world attack examples and insights from experts who uncovered iOS vulnerabilities.
Add to list
20
Lesons
48 minutes
On-Demand
Free-Video
OWASP Foundation
AppSecUSA 2014 Builders Track - Friday Sessions
0
rewiews
Explore key AppSec topics: mobile security, threat modeling, continuous security, and component vulnerabilities. Gain insights from industry experts to enhance your application security practices.
Add to list
5
Lesons
5 hours 56 minutes
On-Demand
Free-Video
OWASP Foundation
AppSecUSA 2014 - Breakers Track Sessions
0
rewiews
Explore cutting-edge web and mobile security topics, including mobile attacks, use-after-free exploitation, static analysis, runtime manipulation, and top hacking techniques from AppSecUSA 2014.
Add to list
5
Lesons
6 hours 12 minutes
On-Demand
Free-Video
OWASP Foundation
AppSec is Eating Security
0
rewiews
Explore the future of information security with Yahoo's CISO Alex Stamos as he discusses the evolving landscape of application security and its impact on the broader security field.
Add to list
1
Lesons
1 hour 6 minutes
On-Demand
Free-Video
OWASP Foundation
Top 10 Web Hacking Techniques of 2013 - OWASP AppSecUSA 2014
0
rewiews
Explore the top 10 innovative web hacking techniques of 2013, including Mutation XSS, BREACH, and HTML5 attacks. Learn about cutting-edge security vulnerabilities and their implications for web applications.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP Top 10 Mobile Risks: 2014 Reboot
0
rewiews
Explore the updated 2014 OWASP Top 10 Mobile Risks, comparing changes since 2011, understanding new threats, and learning recommended fixes for iOS, Android, and Windows Phone platforms.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
OWASP Foundation
Android and iPhone Risks and Solutions
0
rewiews
Explore mobile security risks and effective solutions for Android and iPhone devices, enhancing your understanding of smartphone vulnerabilities and protection strategies.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
OWASP Foundation
Seven Deadly Sins of Mobile Application Development - Unlocking Mobile Hacking Vulnerabilities
0
rewiews
Unlock mobile app security secrets: Learn common development mistakes, session management vulnerabilities, and best practices to protect against attacks and impersonation.
Add to list
15
Lesons
41 minutes
On-Demand
Free-Video
Cooper
Smartphone Apps: Let's Talk About Privacy
0
rewiews
Explore smartphone app privacy concerns and learn strategies to protect your personal data in this insightful talk by security researcher Axelle Apvrille.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
BSidesLV
Building Secure Hybrid Mobile Applications - A Security Professional's Guide
0
rewiews
Learn to assess and secure hybrid mobile apps by understanding threat models and vetting external libraries, enhancing your ability to build robust applications.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Cooper
Open Wounds: The Last 5 Years Have Left Bluetooth to Bleed
0
rewiews
Explore critical Bluetooth vulnerabilities from the past 5 years, their impact on device security, and potential mitigation strategies in this eye-opening cybersecurity analysis.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
media.ccc.de
Analyzing Cellular Basebands with FirmWire
0
rewiews
Explore FirmWire, an open-source platform for analyzing cellular basebands. Learn about baseband vulnerabilities, emulation techniques, and how to uncover security flaws in LTE and GSM stacks.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
Cooper
Building an Evil Phone Charging Station
0
rewiews
Explore the creation of malicious phone charging stations, understanding potential security risks and vulnerabilities in public charging infrastructure.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
Cooper
Embedded Threats: A Deep Dive Into the eSIM World
0
rewiews
Explore the security vulnerabilities and potential threats in embedded SIM technology, uncovering risks and implications for mobile communications and IoT devices.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
B(l)utter - Reversing Flutter Applications - HITB2023HKT COMMSEC Day 2
0
rewiews
Innovative approach to reverse engineering Flutter apps using Dart runtime source code. Introduces B(l)utter tool for metadata extraction, code analysis, and Frida script generation.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
CAE in Cybersecurity Community
ReLF - Scalable Remote Live Forensics for Android
0
rewiews
Explore scalable remote live forensics techniques for Android devices, focusing on innovative approaches to digital investigation and cybersecurity in mobile environments.
Add to list
1
Lesons
56 minutes
On-Demand
Free-Video
Ubuntu OnAir
Secure Credentials Storage on the Phone
0
rewiews
Explore secure methods for storing sensitive credentials on mobile devices, focusing on best practices and implementation techniques for enhanced data protection.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Android Developers
Developing Privacy User-Centric Apps for Android
0
rewiews
Learn to create Android apps that prioritize user privacy, incorporating the latest improvements and best practices for a safe mobile ecosystem.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
secwestnet
PWN2OWN Austin 2021 - Phones, Printers, NAS, and More
0
rewiews
Explore cutting-edge cybersecurity challenges at PWN2OWN Austin 2021, featuring hacking competitions for phones, printers, NAS devices, and routers with over $500,000 in prizes.
Add to list
1
Lesons
2 hours 27 minutes
On-Demand
Free-Video
secwestnet
PWN2OWN Austin 2021 - Phones, Printers, NAS, and More
0
rewiews
Explore cutting-edge hacking techniques targeting phones, printers, NAS, and more at PWN2OWN Austin 2021. Witness live demonstrations of exploits on 22 devices with $500,000+ in prizes.
Add to list
1
Lesons
7 hours 19 minutes
On-Demand
Free-Video
secwestnet
PWN2OWN Austin 2021 - Phones, Printers, NAS, and More
0
rewiews
Live coverage of Pwn2Own Austin 2021, showcasing hacking attempts on phones, printers, NAS devices, and routers. Witness cybersecurity experts compete for over $500,000 in prizes.
Add to list
1
Lesons
7 hours 56 minutes
On-Demand
Free-Video
Black Hat
Privacy Detective - Sniffing Out Your Data Leaks for Android
0
rewiews
Discover techniques to detect privacy-infringing behaviors in Android apps. Learn about hooking system functions, decrypting TLS traffic, and automating privacy data transmission analysis.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
OffensiveCon
New Phones, Software and Chips - New Bugs?
0
rewiews
Explore cutting-edge vulnerabilities in modern smartphones, examining software and hardware innovations that introduce new security challenges.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
load more...