Skip to main content

Home/ Information Security/ Group items tagged videos

Rss Feed Group items tagged

David Szpunar

Even MORE Metasploit Tutorial Videos! - 0 views

  •  
    Links (by Security Monkey) to extensive Metasploit training videos on SecurityTube by the SecurityTube owner. Excellent ethical-hacker training!
Skeptical Debunker

Sea World killer whale attack video leads to malware | Graham Cluley's blog - 0 views

  •  
    Dawn Brancheau, a trainer at Sea World in Orlando, was killed yesterday after being attacked by a killer whale. News of the tragedy sped quickly around the world, and now sick cybercriminals are exploiting the story of 40-year-old Brancheau's death for their own commerical gain. Through SEO (search engine optimisation) techniques, hackers have created webpages stuffed with content which appears to be ghoulish video footage of the animal trainer's death - but are really designed to infect visiting computers.
Select Security  Systems Ltd

Video Web Camera Surveillance - 3 views

  •  
    Video web camera surveillance services can now be availed from us at Select Security. We have the expertise to facilitate your needs through our skilled services. Get connected and explore more today!
netifera platform

netifera video the java virtual machine as shellcode - 0 views

  •  
    In this screencast we're going to look at some features we are working on for the next version of netifera. The two main things we're going to demonstrate are geographical visualization and the netifera probe which is a deployable software agent that makes it possible to run all netifera platform tools remotely as easily as running them locally.
Skeptical Debunker

GPS Jamming Devices Pose Many Threats (w/ Video) - 0 views

  • GPS jammers send out a radio signal that’s the same frequency as the satellite signal. Since GPS satellite signals are weak, a GPS jamming device that puts out approximately 2 watts is sufficient to disrupt a GPS signal in a vehicle that’s approximately within 10 feet of the device. This leaves the in-vehicle system unable to establish its position and report back to a GPS tracking center, where the vehicle is registered. There are also fears that terrorists can use these devices to disrupt air traffic and cause severe safety and economic damage to the US. More powerful jammers could disrupt GPS signals in close proximity of airports, causing safety concerns. Our military overseas use GPS extensively to record their position as well as the position of the enemy. With GPS jamming devices in the hands of our enemy, U.S. and allied forces can be severely impacted when launching ground and air-strikes.
  •  
    The latest GPS jamming devices are now being used by car thieves in the UK to render stolen cars and trucks undetectable by law enforcement. These devices also pose a threat to airlines and US military overseas.
Skeptical Debunker

Technology Review: Mapping the Malicious Web - 0 views

  • Now a researcher at Websense, a security firm based in San Diego, has developed a way to monitor such malicious activity automatically. Speaking at the RSA Security Conference in San Francisco last week, Stephan Chenette, a principal security researcher at Websense, detailed an experimental system that crawls the Web, identifying the source of content embedded in Web pages and determining whether any code on a site is acting maliciously. Chenette's software, called FireShark, creates a map of interconnected websites and highlights potentially malicious content. Every day, the software maps the connections between nearly a million websites and the servers that provide content to those sites. "When you graph multiple sites, you can see their communities of content," Chenette says. While some of the content hubs that connect different communities could be legitimate--such as the servers that provide ads to many different sites--other sources of content could indicate that an attacker is serving up malicious code, he says. According to a study published by Websense, online attackers' use of legitimate sites to spread malicious software has increased 225 percent over the past year.
  •  
    Over the past couple of years, cybercriminals have increasingly focused on finding ways to inject malicious code into legitimate websites. Typically they've done this by embedding code in an editable part of a page and using this code to serve up harmful content from another part of the Web. But this activity can be difficult to spot because websites also increasingly pull in legitimate content, such as ads, videos, or snippets of code, from outside sites.
Select Security  Systems Ltd

Low Voltage Wiring Edmonton - 1 views

  •  
    Select Security System provide Single Core Cables are mainly used for industrial and domestic uses and for low voltage wiring. They are mainly available in brown and blue color. These cables are used for audio and video signal transmission.
Zaid Mark

Fix Error Code 2 - Unable to install applications on your system - 0 views

  •  
    If you are failed to install an application, then you are likely to see error code 2 on your system. Luckily, there is a way out of it. You can fix Error code 2 by implementing the solutions provided in the video embedded below
Zaid Mark

Protect Your Windows 8 PC with a Picture Password - 0 views

  •  
    Windows 8 enables you to protect your account with a picture password. The magnetism of a picture password is obvious. Moreover, it may well prove to be a faster means of logging in. Follow this video tutorial to enable picture password.
Select Security  Systems Ltd

Internet Home Security Cameras- 2016 - 6 views

  •  
    Security cameras come many types and have seemingly endless feature options. With so many different kinds of home security cameras available, deciding which one makes sense for your home can be a daunting task.Commonly there are two types of security cameras indoor cameras, and outdoor cameras.Both types of cameras are available as standalone units with monitoring apps or as part of a subscription-based home security monitoring system.
1 - 14 of 14
Showing 20 items per page