Enviar búsqueda
Cargar
Algoritmo
•
Descargar como PPTX, PDF
•
0 recomendaciones
•
79 vistas
Carolina Kaneswaran
Seguir
Algoritmo Informatica
Leer menos
Leer más
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 5
Descargar ahora
Recomendados
Symbian Botnet? Mobile Linux Rootkits? iPhone Botnets? Millions of phones at risk? The press coverage on smart phone threats is at times somewhat accurate, distant, and occasionally (if unintentionally) misleading. They tend to raise questions such as: How close to PC levels (100,000+ to millions of nodes) have mobile botnets reached? Have mobile rootkits reached the complexity of those on the PC? This talk covered the state of rootkits and botnets on smart phones from the perspective of anti-malware researchers, including demystification of the threat from mobile rootkits and mobile botnets, the differences (if any) between mobile rootkits and mobile botnets vs. their PC counterparts, and a look at how samples seen in the wild and researcher PoCs function.
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
Jimmy Shah
Mobile devices are not simply PCs. While one knows to look for an Advanced Persistent Threat(APT) on their desktop endpoints, mobile tends to be ignored. Setting up an MDM solution is not enough. Installing AV on as many devices as possible is not enough. The holes in the net are still too wide; attackers have more options than just malicious apps for getting on your network. Topics covered will be: How attackers are moving to mobile in order to bypass traditional protection. Apps are only one part of the problem. Documents, email, messaging are still left wide open Bypassing Mobile Antivirus Bypassing MDM, MAM and Containers Attackers are turning from apps to exploits. Finally we’ll cover what to do next – how to effectively deal with Mobile APT.
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
Jimmy Shah
Contemporary Writing and Business Communication – ORG536 - Dr. Brian Neff
Best practices in business
Best practices in business
adelliott
small world, a fruit juice bar, operating in Dhaka, Bangladesh.
small world
small world
coulibaly88
The 'Platypus' talk Malware on mobile phones is rapidly increasing. There are many reasons for this, but the primary one is the ease of monetizing malware on mobile phones, Attackers are incentivized to create more malware faster and cheaper. They are overwhelming the limited resources of malware researchers with this glut of cheap and "good enough" malware. Malware can be identified by humans, but there is insufficient time to handle all that is released daily by malware writers. There is a need to develop both better heuristics and the tools that let an analyst separate the wheat from the chaff. The presentation will cover not just the development of heuristics for mobile malware, but also its path from simple detection to more advanced and more successful(i.e fewer false positives) detection. Along the way we will cover the missteps and pitfalls that slow the development of automation.
Mobile malware heuristics the path from 'eh' to pretty good'
Mobile malware heuristics the path from 'eh' to pretty good'
Jimmy Shah
This presentation will discuss the resources available to attackers to write Android viruses, including methods of infecting executables, gaining control from the original app and avoiding detection.
Viruses on mobile platforms why we don't/don't we have viruses on android_
Viruses on mobile platforms why we don't/don't we have viruses on android_
Jimmy Shah
The Internet of Things is not as complex as one would think. Objects(e.g. Power meters, Fridge computers, etc.) or "Things" don;t have their own Internet, instead they "speak" to each other over the same Internet we all use. There lies their vulnerability. Assuming that since the machines will only talk to each other, that no one will eavesdrop or intrude on their conversation. Security researchers have a saying, "Security through Obscurity is no Security". The presentation shows how the Internet of Things' veil of obscurity can be pierced by an attacker(or more likely a Security Researcher) would assess a particular Smart Parking Meter ecosystem. Only open source intelligence(OSINT)[e.g. patents, newspaper articles] was used to compile the information on: * parking meters * mesh networking * machine2machine(m2m) SIMs * management consoles * RF usage
Solar Powered Parking Meters - An IoT thought experiment
Solar Powered Parking Meters - An IoT thought experiment
Jimmy Shah
Attackers are starting to move on from simple attacks, mainly because users are starting to figure out that the free adult entertainment or chat app shouldn't be sending SMS messages to expensive numbers. They're leveraging techniques from PC malware like server-side polymorphism, vulnerability exploits, botnets and network updates, and preemptive/direct attacks against security software.
Isn't it all just SMS-sending trojans?: Real Advances in Android Malware
Isn't it all just SMS-sending trojans?: Real Advances in Android Malware
Jimmy Shah
Recomendados
Symbian Botnet? Mobile Linux Rootkits? iPhone Botnets? Millions of phones at risk? The press coverage on smart phone threats is at times somewhat accurate, distant, and occasionally (if unintentionally) misleading. They tend to raise questions such as: How close to PC levels (100,000+ to millions of nodes) have mobile botnets reached? Have mobile rootkits reached the complexity of those on the PC? This talk covered the state of rootkits and botnets on smart phones from the perspective of anti-malware researchers, including demystification of the threat from mobile rootkits and mobile botnets, the differences (if any) between mobile rootkits and mobile botnets vs. their PC counterparts, and a look at how samples seen in the wild and researcher PoCs function.
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
Jimmy Shah
Mobile devices are not simply PCs. While one knows to look for an Advanced Persistent Threat(APT) on their desktop endpoints, mobile tends to be ignored. Setting up an MDM solution is not enough. Installing AV on as many devices as possible is not enough. The holes in the net are still too wide; attackers have more options than just malicious apps for getting on your network. Topics covered will be: How attackers are moving to mobile in order to bypass traditional protection. Apps are only one part of the problem. Documents, email, messaging are still left wide open Bypassing Mobile Antivirus Bypassing MDM, MAM and Containers Attackers are turning from apps to exploits. Finally we’ll cover what to do next – how to effectively deal with Mobile APT.
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
Jimmy Shah
Contemporary Writing and Business Communication – ORG536 - Dr. Brian Neff
Best practices in business
Best practices in business
adelliott
small world, a fruit juice bar, operating in Dhaka, Bangladesh.
small world
small world
coulibaly88
The 'Platypus' talk Malware on mobile phones is rapidly increasing. There are many reasons for this, but the primary one is the ease of monetizing malware on mobile phones, Attackers are incentivized to create more malware faster and cheaper. They are overwhelming the limited resources of malware researchers with this glut of cheap and "good enough" malware. Malware can be identified by humans, but there is insufficient time to handle all that is released daily by malware writers. There is a need to develop both better heuristics and the tools that let an analyst separate the wheat from the chaff. The presentation will cover not just the development of heuristics for mobile malware, but also its path from simple detection to more advanced and more successful(i.e fewer false positives) detection. Along the way we will cover the missteps and pitfalls that slow the development of automation.
Mobile malware heuristics the path from 'eh' to pretty good'
Mobile malware heuristics the path from 'eh' to pretty good'
Jimmy Shah
This presentation will discuss the resources available to attackers to write Android viruses, including methods of infecting executables, gaining control from the original app and avoiding detection.
Viruses on mobile platforms why we don't/don't we have viruses on android_
Viruses on mobile platforms why we don't/don't we have viruses on android_
Jimmy Shah
The Internet of Things is not as complex as one would think. Objects(e.g. Power meters, Fridge computers, etc.) or "Things" don;t have their own Internet, instead they "speak" to each other over the same Internet we all use. There lies their vulnerability. Assuming that since the machines will only talk to each other, that no one will eavesdrop or intrude on their conversation. Security researchers have a saying, "Security through Obscurity is no Security". The presentation shows how the Internet of Things' veil of obscurity can be pierced by an attacker(or more likely a Security Researcher) would assess a particular Smart Parking Meter ecosystem. Only open source intelligence(OSINT)[e.g. patents, newspaper articles] was used to compile the information on: * parking meters * mesh networking * machine2machine(m2m) SIMs * management consoles * RF usage
Solar Powered Parking Meters - An IoT thought experiment
Solar Powered Parking Meters - An IoT thought experiment
Jimmy Shah
Attackers are starting to move on from simple attacks, mainly because users are starting to figure out that the free adult entertainment or chat app shouldn't be sending SMS messages to expensive numbers. They're leveraging techniques from PC malware like server-side polymorphism, vulnerability exploits, botnets and network updates, and preemptive/direct attacks against security software.
Isn't it all just SMS-sending trojans?: Real Advances in Android Malware
Isn't it all just SMS-sending trojans?: Real Advances in Android Malware
Jimmy Shah
Mobile malware analysis with the a.r.e. vm
Mobile malware analysis with the a.r.e. vm
Jimmy Shah
Presentazione per Forum Ambrosetti. Come la disintermediazione ha creato un nuovo modello di mercato on-demand. Tutti i business ne sono stati contagiati, qual è quindi il nuovo ruolo della marca? Come un'azienda può trarre vantaggio da questo nuovo ecosistema? Uno sguardo verso il futuro.
Forum Ambrosetti - Firenze 21 gennaio 2015
Forum Ambrosetti - Firenze 21 gennaio 2015
Matteo Sarzana
Contemporary Writing and Business Communication – ORG536
Training the Trainer - Module 6
Training the Trainer - Module 6
adelliott
in un mondo dove l'innovazione è costante e ha toccato tutti gli ambiti della nostra vita, dobbiamo essere pronti ad affrontare un cambiamento evolutivo anche in ambiti meno comuni come la medicina e la robotica. se l'evoluzione è per sua natura positiva, non possiamo non tenere conto delle implicazioni di questa evoluzione. da qui il titolo "pensieri piccanti", da una parte uno stimolo a guardare al futuro, dall'altra la "sana" preoccupazione delle tematiche che dovremo affrontare nel prossimo futuro.
Pensieri Piccanti
Pensieri Piccanti
Matteo Sarzana
Healthcare and disintermediation: the opportunity My point of view about the disintermediation trend, how is affecting every business and a focus on the opportunities for companies operating in the healthcare segment. The presentation covers a lot of examples from around the world, such as: docplanner, zocdoc, scanadu, etc... A key role, in my vision, is delegated to the promoter who can act as the enabling platform to bring education about the opportunities.
Healthcare and disintermediation: the opportunity
Healthcare and disintermediation: the opportunity
Matteo Sarzana
A personal overview of the most interesting trends of SXSW 2016. From liquid expectations to on demand economy. Trends and examples from the SXSW Event
SXSW 2016 - Top Trends
SXSW 2016 - Top Trends
Matteo Sarzana
Eyvana Zabaleta María José Cerpa Nicolle Dejanon Zulay Daza
Avances tecnológicos del siglo XXI 10-07 eyvana
Avances tecnológicos del siglo XXI 10-07 eyvana
mcerpam
La Revolución Digital del siglo XXI ha sido un fenómeno de transformación sin precedentes, caracterizado por la rápida adopción y avance de tecnologías digitales en todos los ámbitos de la sociedad.
EVOLUCION DE LA TECNOLOGIA Y SUS ASPECTOSpptx
EVOLUCION DE LA TECNOLOGIA Y SUS ASPECTOSpptx
JorgeParada26
La sensibilidad al cobre por parte de microorganismos biolixiviadores es uno de los principales problemas que enfrenta la minería para mejorar los procesos de biolixiviación. En tal sentido, nosotros evaluamos la resistencia al cobre de un consorcio microbiano conformado por Sulfobacillus spp., y Acidithiobacillus ferrooxidans, el cual se propagó, en bioreactores de tanque aireado y agitado de 1 L, los cuales contenían medio 9K suplementado con hierro y concentraciones crecientes de cobre (200 mM, 400 mM, 600 mM, 800 mM y 1,000 mM) a 30°C con un pH de 1.6 durante 96 horas. Se colectó una muestra de cada biorreactor cada 8 horas, para realizar análisis, microscópicos y moleculares, además el cultivo del consorcio en placa mostró una resistencia al cobre hasta 1,000 mM.
Resistencia extrema al cobre por un consorcio bacteriano conformado por Sulfo...
Resistencia extrema al cobre por un consorcio bacteriano conformado por Sulfo...
JohnRamos830530
redes informaticas
redes informaticas en una oficina administrativa
redes informaticas en una oficina administrativa
nicho110
Guía básica sobre circuitos eléctricos
Guia Basica para bachillerato de Circuitos Basicos
Guia Basica para bachillerato de Circuitos Basicos
JhonJairoRodriguezCe
Presentación de MuleSoft Meetup Buenos Aires 30/04/2024
Buenos_Aires_Meetup_Redis_20240430_.pptx
Buenos_Aires_Meetup_Redis_20240430_.pptx
Federico Castellari
Innovaciones tecnologicas en el siglo 21
Innovaciones tecnologicas en el siglo 21
Innovaciones tecnologicas en el siglo 21
mariacbr99
Tutorial para publicar una presentación o exposición en SlideShare
PROYECTO FINAL. Tutorial para publicar en SlideShare.pptx
PROYECTO FINAL. Tutorial para publicar en SlideShare.pptx
Alan779941
How to use Redis with MuleSoft. Basic cache concepts.
How to use Redis with MuleSoft. A quick start presentation.
How to use Redis with MuleSoft. A quick start presentation.
FlorenciaCattelani
avances tecnológicos del siglo XXI
investigación de los Avances tecnológicos del siglo XXI
investigación de los Avances tecnológicos del siglo XXI
hmpuellon
Este es un documento el cual podemos conocer la tecnología y como está ha avanzado con el tiempo.
Avances tecnológicos del siglo XXI y ejemplos de estos
Avances tecnológicos del siglo XXI y ejemplos de estos
sgonzalezp1
Más contenido relacionado
Destacado
Mobile malware analysis with the a.r.e. vm
Mobile malware analysis with the a.r.e. vm
Jimmy Shah
Presentazione per Forum Ambrosetti. Come la disintermediazione ha creato un nuovo modello di mercato on-demand. Tutti i business ne sono stati contagiati, qual è quindi il nuovo ruolo della marca? Come un'azienda può trarre vantaggio da questo nuovo ecosistema? Uno sguardo verso il futuro.
Forum Ambrosetti - Firenze 21 gennaio 2015
Forum Ambrosetti - Firenze 21 gennaio 2015
Matteo Sarzana
Contemporary Writing and Business Communication – ORG536
Training the Trainer - Module 6
Training the Trainer - Module 6
adelliott
in un mondo dove l'innovazione è costante e ha toccato tutti gli ambiti della nostra vita, dobbiamo essere pronti ad affrontare un cambiamento evolutivo anche in ambiti meno comuni come la medicina e la robotica. se l'evoluzione è per sua natura positiva, non possiamo non tenere conto delle implicazioni di questa evoluzione. da qui il titolo "pensieri piccanti", da una parte uno stimolo a guardare al futuro, dall'altra la "sana" preoccupazione delle tematiche che dovremo affrontare nel prossimo futuro.
Pensieri Piccanti
Pensieri Piccanti
Matteo Sarzana
Healthcare and disintermediation: the opportunity My point of view about the disintermediation trend, how is affecting every business and a focus on the opportunities for companies operating in the healthcare segment. The presentation covers a lot of examples from around the world, such as: docplanner, zocdoc, scanadu, etc... A key role, in my vision, is delegated to the promoter who can act as the enabling platform to bring education about the opportunities.
Healthcare and disintermediation: the opportunity
Healthcare and disintermediation: the opportunity
Matteo Sarzana
A personal overview of the most interesting trends of SXSW 2016. From liquid expectations to on demand economy. Trends and examples from the SXSW Event
SXSW 2016 - Top Trends
SXSW 2016 - Top Trends
Matteo Sarzana
Destacado
(6)
Mobile malware analysis with the a.r.e. vm
Mobile malware analysis with the a.r.e. vm
Forum Ambrosetti - Firenze 21 gennaio 2015
Forum Ambrosetti - Firenze 21 gennaio 2015
Training the Trainer - Module 6
Training the Trainer - Module 6
Pensieri Piccanti
Pensieri Piccanti
Healthcare and disintermediation: the opportunity
Healthcare and disintermediation: the opportunity
SXSW 2016 - Top Trends
SXSW 2016 - Top Trends
Último
Eyvana Zabaleta María José Cerpa Nicolle Dejanon Zulay Daza
Avances tecnológicos del siglo XXI 10-07 eyvana
Avances tecnológicos del siglo XXI 10-07 eyvana
mcerpam
La Revolución Digital del siglo XXI ha sido un fenómeno de transformación sin precedentes, caracterizado por la rápida adopción y avance de tecnologías digitales en todos los ámbitos de la sociedad.
EVOLUCION DE LA TECNOLOGIA Y SUS ASPECTOSpptx
EVOLUCION DE LA TECNOLOGIA Y SUS ASPECTOSpptx
JorgeParada26
La sensibilidad al cobre por parte de microorganismos biolixiviadores es uno de los principales problemas que enfrenta la minería para mejorar los procesos de biolixiviación. En tal sentido, nosotros evaluamos la resistencia al cobre de un consorcio microbiano conformado por Sulfobacillus spp., y Acidithiobacillus ferrooxidans, el cual se propagó, en bioreactores de tanque aireado y agitado de 1 L, los cuales contenían medio 9K suplementado con hierro y concentraciones crecientes de cobre (200 mM, 400 mM, 600 mM, 800 mM y 1,000 mM) a 30°C con un pH de 1.6 durante 96 horas. Se colectó una muestra de cada biorreactor cada 8 horas, para realizar análisis, microscópicos y moleculares, además el cultivo del consorcio en placa mostró una resistencia al cobre hasta 1,000 mM.
Resistencia extrema al cobre por un consorcio bacteriano conformado por Sulfo...
Resistencia extrema al cobre por un consorcio bacteriano conformado por Sulfo...
JohnRamos830530
redes informaticas
redes informaticas en una oficina administrativa
redes informaticas en una oficina administrativa
nicho110
Guía básica sobre circuitos eléctricos
Guia Basica para bachillerato de Circuitos Basicos
Guia Basica para bachillerato de Circuitos Basicos
JhonJairoRodriguezCe
Presentación de MuleSoft Meetup Buenos Aires 30/04/2024
Buenos_Aires_Meetup_Redis_20240430_.pptx
Buenos_Aires_Meetup_Redis_20240430_.pptx
Federico Castellari
Innovaciones tecnologicas en el siglo 21
Innovaciones tecnologicas en el siglo 21
Innovaciones tecnologicas en el siglo 21
mariacbr99
Tutorial para publicar una presentación o exposición en SlideShare
PROYECTO FINAL. Tutorial para publicar en SlideShare.pptx
PROYECTO FINAL. Tutorial para publicar en SlideShare.pptx
Alan779941
How to use Redis with MuleSoft. Basic cache concepts.
How to use Redis with MuleSoft. A quick start presentation.
How to use Redis with MuleSoft. A quick start presentation.
FlorenciaCattelani
avances tecnológicos del siglo XXI
investigación de los Avances tecnológicos del siglo XXI
investigación de los Avances tecnológicos del siglo XXI
hmpuellon
Este es un documento el cual podemos conocer la tecnología y como está ha avanzado con el tiempo.
Avances tecnológicos del siglo XXI y ejemplos de estos
Avances tecnológicos del siglo XXI y ejemplos de estos
sgonzalezp1
Último
(11)
Avances tecnológicos del siglo XXI 10-07 eyvana
Avances tecnológicos del siglo XXI 10-07 eyvana
EVOLUCION DE LA TECNOLOGIA Y SUS ASPECTOSpptx
EVOLUCION DE LA TECNOLOGIA Y SUS ASPECTOSpptx
Resistencia extrema al cobre por un consorcio bacteriano conformado por Sulfo...
Resistencia extrema al cobre por un consorcio bacteriano conformado por Sulfo...
redes informaticas en una oficina administrativa
redes informaticas en una oficina administrativa
Guia Basica para bachillerato de Circuitos Basicos
Guia Basica para bachillerato de Circuitos Basicos
Buenos_Aires_Meetup_Redis_20240430_.pptx
Buenos_Aires_Meetup_Redis_20240430_.pptx
Innovaciones tecnologicas en el siglo 21
Innovaciones tecnologicas en el siglo 21
PROYECTO FINAL. Tutorial para publicar en SlideShare.pptx
PROYECTO FINAL. Tutorial para publicar en SlideShare.pptx
How to use Redis with MuleSoft. A quick start presentation.
How to use Redis with MuleSoft. A quick start presentation.
investigación de los Avances tecnológicos del siglo XXI
investigación de los Avances tecnológicos del siglo XXI
Avances tecnológicos del siglo XXI y ejemplos de estos
Avances tecnológicos del siglo XXI y ejemplos de estos
Descargar ahora