Security
Mobile Device Insecurity
This presentation serves as an introduction into the classes of security problems in mobile devices, including system password retrieval, debugging modes, and synchronization interfaces of Palm, Pocket PC, and Psion/Symbian platforms. Attack vectors and malicious code risks are examined, as are key recommendations for securing mobile devices in the face of these problems. [ continue ]
A Hacker’s Top 10 Guide to Protecting Enterprise Systems
Implementing proper computer security in your enterprise systems can only occur after an understanding of attack threats and risks, as no one solution is suitable for every organization. This presentation, based on Microsoft’s “The Ten Immutable Laws of Security,” discusses high-level security concepts and solutions. [ continue ]
Secure Hardware Design for Embedded Systems
The design of secure hardware is often overlooked in the product development lifecycle, leaving many devices vulnerable to hacker attacks resulting in theft of service, loss of revenue, or a damaged reputation. Many times, products must be redesigned after a harmful incident, which raises overall development costs and increases time-to-market. This paper focuses on general concepts for secure hardware design coupled with practical examples. Topics in this paper include recommendations on incorporating security into the product development cycle, attack and threat models, and design solutions for enclosure, circuit board, and firmware layers. [ continue ]
Tribble
Tribble is a hardware expansion card that reliably acquires the volatile memory of an active computer system and retains critical information necessary for forensic analysis in the event of a computer misconduct. The device accesses the target’s memory directly through a hardware interface and does not require any software or drivers to be loaded. [ continue ]
Wireless Site Survey
One of the main benefits of wireless LANs is that they provide an easy method to access your network from anywhere inside your organization, but this is also one of the biggest problems. This presentation discusses ways to properly review your wireless infrastructure so that you can understand potential security risks and remain in control of your network. We examine tools and techniques for mapping wireless LANs and reining them in, along with suggestions and recommendations for maintaining a secure wireless LAN infrastructure. [ continue ]