By Sean Kinney www.industrialiot5G.com More than 100 companies suggest ways U.S. government can help advance the IoT Many in...
Videos being watched right now
10:10 NewAdded 0 Views / 0 Likes
L'interview de Guillaume Lovet avec RCI sur le cyberattaque dont a été victime l'Elysée. Guillaume Lovet's interview with RCI on the cyberattack that the Elysee fell victim to.
05:50 NewAdded 1 Views / 0 Likes
Guillaume Lovet in conversation with France Bleu Périgord on the subject of the "Flashback" Mac Malware
01:38 NewAdded 1 Views / 0 Likes
Guillaume Lovet en conversation avec Radio Classique sur le sujet du malware "Flashback" pour les Macs Guillaume Lovet in conversation with Radio Classic on the subject of the "Flashback" Mac Malware
11:12 NewAdded 3 Views / 0 Likes
Guillaume Lovet parle a LaTeleLibre.fr a propos de Stuxnet et l'art de cyberguerre Guillaume Lovet speaks to LaTeleLibre.fr about Stuxnet and the art of cyberwar
02:42 NewAdded 3 Views / 0 Likes
Axelle Apvrille explique les erreurs de code qui ont contribué à la découverte d'Android/FakeMart - un malware qui a causé un prejudice de 500 000 euros. Axelle Apvrille explains code errors that helped in the discovery of Android/FakeMart - a malware tha
07:43 NewAdded 0 Views / 0 Likes
Guillaume Lovet explique la faille DNS de Dan Kaminsky et phishing dans une interview avec Radio France Internationale (RFI). Guillaume Lovet explains the Dan Kaminsky DNS flaw and phishing in an interview with Radio France Internationale (RFI)
04:09 NewAdded 3 Views / 0 Likes
A working demo of the Android malware Android/Chuli.A. Notes : - The first request receives an HTTP 200 as opposed to 404's for the following requests since the first page has been simulated on the localhost for the purpose of the demo. - The wireshark tr
06:10 NewAdded 0 Views / 0 Likes
* The demo first shows method thisishidden() is present in the DEX. * Then the method is hidden using a script hidex.pl (hide.sh helper script) and the demo shows that dissassemblers don't see it : Androguard, procyon, baksmali, jd-gui... * Then the scrip
00:27 NewAdded 2 Views / 0 Likes
The demo shows a PoC application where a hidden method named "thisishidden()" is successfully called by the application. This was presented at conferences Hacktivity and Hack.Lu in Octoboer 2013 More details at : http://www.fortiguard.com/paper/Playing-Hi
02:48 NewAdded 0 Views / 0 Likes
To detect a hidden method, it is possible to inspect the strings and look for unused strings, or to use androdis.py a tool in Androguard to disassemble a given offset in the Dalvik executables. This was presented at Hacktivity and Hack.lu in October 2013
02:30 NewAdded 3 Views / 0 Likes
The video demonstrates how an Angry Birds application Trojanized with AndroRat can be controlled from a remote server. A brief description of what you see in the video : 0:09 : Installation of the Trojanized Angry Birds application 0:36 : Attacker receive
02:30 NewAdded 0 Views / 0 Likes
More details can be found at the related blog post : http://blog.fortinet.com/Mobile-RAT-Infestation/ Video by : Ruchna Nigam Voice : Patrick Grillo
01:24 NewAdded 0 Views / 0 Likes
Fitness for the Lazy a.k.a. How to fool your Fitness Tracker into thinking you're doing 3 km/h while sitting on your couch? This demo was presented by Axelle Apvrille of Fortinet at the conference Hacktivity 2015. Conference Page : https://hacktivity.com/
00:50 NewAdded 0 Views / 0 Likes
A demonstration of a python script talk2Flex that can talk to a well known Fitness Tracker. This particular example shows it looking for trackers in the vicinity and getting fitness data on the Tracker. This demo was presented by Axelle Apvrille of Fortin
00:25 NewAdded 0 Views / 0 Likes
A demonstration of a python script talk2Flex that can talk to a well known Fitness Tracker. This particular example shows it sending a message 'Hello Hackers!' to the Tracker that is echo'ed back by the Tracker. This demo was presented by Axelle Apvrille
00:41 NewAdded 0 Views / 0 Likes
A Proof of Concept for CVE-2015-4400 - Doorbot Network Configuration Leak Vulnerability. Details : https://blog.fortinet.com/2016/01/22/cve-2015-4400-backdoorbot-network-configuration-leak-on-a-connected-doorbell FortiGuard Advisory : http://www.fortiguar
02:58 NewAdded 0 Views / 0 Likes
200 WhiteHat Hackers & Analysts working 24/7. What we do here at FortiGuard Labs in less than 3 minutes! http://blog.fortinet.com/post/fortiguard-labs-the-front-line-of-threat-research FortiGuard Labs are the Threat Research division of Fortinet https://w
00:31 NewAdded 2 Views / 0 Likes
More details at : http://blog.fortinet.com/post/stored-xss-vulnerabilites-on-foscam-3 FortiGuard Advisory : http://fortiguard.com/advisory/fortinet-discovers-foscam-stored-xss-vulnerabilities
01:24 NewAdded 0 Views / 0 Likes
How CVE-2016-3820 triggered by specially crafted MMS or media files can crash Android Mediaserver. A detailed analysis can be found at https://blog.fortinet.com/2016/08/17/deep-analysis-of-cve-2016-3820-remote-code-execution-vulnerability-in-android-media
03:59 NewAdded 0 Views / 0 Likes
George Henny, Co-CEO of Whidbey Telecom discusses his plans for bringing 10G services via Calix solutions to deliver an unmatched experience to Whidbey subscribers.
05:44 NewAdded 1 Views / 0 Likes
Craig Thomas provides an update on how G.fast technology is evolving from lab trials into live commercial deployments around the world, quickly solving the challenge of bringing gigabit services to subscribers in multi-dwelling units (MDU).
04:13 NewAdded 0 Views / 0 Likes
Jim Brede, Calix Product Line Manager, introduces the E3-2 Intelligent PON Node. Built on the AXOS platform, the E3-2 delivers on the promise of Software Defined Access. The “always on” stateful system allows operators to deploy rich software features dee
02:56 NewAdded 0 Views / 0 Likes
The new Calix AXOS E3-2 Intelligent PON Node does more than just disrupt the economics of fiber deployment – it revolutionizes the OPEX profile of a service provider. Calix Vice President of Product Line Leadership Shane Eleniak explains in this Calix vid
04:47 NewAdded 0 Views / 0 Likes
Light Reading’s Alan Breznick discusses with Doug Blue, Calix Solutions Marketing Director, how the latest Calix innovation, the E3-2, facilitates dramatic network transformation.
05:31 NewAdded 0 Views / 0 Likes
Leading the broadband charge among electric cooperatives, Midwest Energy is leveraging the power of Calix Compass cloud services and GigaCenters to rapidly grow their service offering and become the “Utility of the Future” in southwest Michigan.
05:05 NewAdded 0 Views / 0 Likes
With a growing business in the booming Fargo, North Dakota area, 702 Communications is outpacing the competition with gigabit services via Calix G.fast solutions in the area's multi-dwelling unit buildings.
05:39 NewAdded 0 Views / 0 Likes
Around the country, CenturyLink is transforming and simplifying the subscriber experience for all MDU residents with their innovative CenturyLink ON platform.
05:00 NewAdded 0 Views / 0 Likes
Deepak Verma, Director of Product Line Leadership, provides a detailed overview of the E9-2 Intelligent Edge System, highlighting how the E9-2 will break new ground at access edge.