Commercial Spyware- Detecting the Undetectable. July 2015
|
|
|
- Lora Cobb
- 10 years ago
- Views:
Transcription
1 Commercial Spyware- Detecting the Undetectable July 2015
2 About the Authors Joshua Dalman Second generation digital forensics examiner M.S. Digital Forensics (University of Central Florida) Certifications: ACE, CCE, CFE, CFCE, EnCE, etc
3 About the Authors Valerie Hantke M.S. Cybersecurity (UMUC) and B.S. Electrical Engineering (USNA) Certifications: EnCE, ACE, GCIH, GMOB, CEH
4 Overview Mobile Spyware Introduction Research Methods SpyToMobile Results mspy Results Conclusion
5 Spyware Introduction Mobile spyware is: Easily available Easy to install Lots of features Stores data on remote server Already in your enterprise network?
6 What We Know Lacoon Mobile Security /Check Point Study: Sampled nearly 1 million devices (50% Android, 40% ios, 10% Other) communicating through corporate Wi-Fi. Detected over 20 variants and 18 different families of spyware products. Two spyware programs (SpyToMobile and Mspy) accounted for more than half of all infections. Organizations with 2,000 devices on their enterprise have 50% chance of infection.
7 What could possibly go wrong?
8
9 Spyware Features Most spyware programs collect at minimum the following types of information: Text Messages Call History Contact List Web History Wi-Fi Networks s Calendar, Notes, Tasks GPS Location
10 Are These Legal? Previously marketed towards cheating spouses. Tools now marketed towards employee and child monitoring. Legal disclaimer during installation. Many spyware companies still running.
11 Research Conducted Device Used: Samsung Galaxy S3 Model: GT-I9800I Android Version: (KitKat) Application Memory Exploitation Android Debug Bridge (ADB) Mem and Netcat Strings Physical device acquisition and analysis Cellebrite UFED4PC Cellebrite Physical Analyzer
12 About mspy Most common mobile spyware application, accounting for nearly one third of infections Sold on a subscription basis Claims to have over one million customers
13 Installation and Monitoring Requires physical access to the phone Modify security settings to allow untrusted apps. Browse to Download and install bt.apk Enter unique passcode that is generated and ed after purchase. And if you have trouble installing the spyware
14
15 Command and Control
16 Customizable Settings
17 Forensic Analysis Results: mspy
18 Application Memory Exploitation Results mspy settings found: sh":"87b3ed68bae3bc a76e00d79","config":{"gps":{"enable":true,"interval":"1","force_gps":true},"sms":{"enable":true,"wifionly":false }," ":{"enable":true,"wifionly":false,"call":{"enable":true,"wifionly":false},"memos":{"enable":true,"wifionly":false},"note":{"enable":true,"wifi only":false},"event":{"enable":true,"wifionly":false},"task":{"enable":true,"wifionly":false},"contact":{"enable":true,"wifionly":false},"apps":{"enabl e":true,"wifionly":false},"audio":{"enable":true,"wifionly":false},"photo":{"enable":true,"wifionly":true},"video":{"enable":true,"wifionly":true},"br owser":{"enable":true,"wifionly":false},"callrecording":{"enable":true,"wifionly":false},"skype":{"enable":true,"wifionly":false},"line":{"enable":true,"wifionly":false},"whatsapp":{"enable":true,"wifionly":false},"facebook":{"enable":true,"wifionly":false},"viber":{"enable":true,"wifionly":false},"ke ylogger":{"enable":true,"wifionly":false},"update":{"interval":"1"},"logs":{"enable":false},"build_version":{"is_trial":false},"photospying":{"enable":t rue,"wifionly":false},"snapchat":{"enable":true,"wifionly":false},"wifi_networks":{"enable":true,"wifionly":false},"version_available":0},"commands _list":[],"status_code_text":"ok - Everything worked as expected.","status":200}
19 Application Memory Exploitation Results mspy also captured the location of the device: locations":[{"timestamp":" ","accuracy": ,"longitude":" ","latitude":" "},{"timestamp":" ","accuracy": ,"longitude":" ","latitude":" "},{"timestamp":" ","accuracy": ,"longitude":" ","latitude":" "},{"timestamp":" ","accuracy": ,"longitude":" ","latitude":" "},{"timestamp":" ","accuracy": ,"longitude":" ","latitude":" "},{"timestamp":" ","accuracy": ,"longitude":" ","latitude":" "},{"timestamp":" ","accuracy": ,"longitude":" ","latitude": mspy Domains: url LIKE '%mspy%' OR url LIKE '%thd.cc%' OR url LIKE '%mspyonline.com%'
20 Packet Capture Results Analysis of network traffic indicates that mspy communicated with IP Address using TCP over port 443.
21 IP Address Information
22 Physical Acquisition Analysis Summary Google Chrome history contained evidence that the user visited and downloaded bt.apk. The mspy application installed to /Root/data/android.sys.process. The applications folder contained a sqlite database (internal.db) that stored all data collected by mspy and a.xml file (settings.xml) which stores the spyware s settings.
23 Internal.db
24 About SpyToMobile Second most common mobile spyware Sold on a subscription basis Cost $0.99 per day
25 Installing and Monitoring Requires physical access to the phone Modify security settings to allow untrusted apps. Browse to SpyToMobile.com/d Download and install Data_backup.apk Put Data Backup widget on the screen. Enter address.
26 Command and Control
27 Forensic Analysis Results: SpyToMobile
28 Application Memory Exploitation SpyToMobile recorded text message: {"viber_time":0,"sms_time": ,"call_time": ,"viber_call_time":0,"wapp_call_time":0,"sms" :[{"u": ,"t":2,"m":"i love Black Hat 2015!\n","a":" "}],"wapp_time":0} duration /data/data/com.spy2mobile.light/databases/msgstore.d b
29 Application Memory Exploitation Evidence of SpyToMobile recording wireless network locations: Guest Network-columbia/xx:xx:xx:xx:xx:xx RSSI:-44 W:87.0 C:-1 L: Pentest_Lab2/xx:xx:xx:xx:xx:7d RSSI:-49 W:85.0 C:-1 L: /data/data/com.spy2mobile.light/database /data/data/com.spy2mobile.light/databases/system.db WiFi stored: Guest Network-columbia/xx:xx:xx:xx:xx:xx RSSI:-44 W:87.0 C:-1 L:
30 Packet Capture Results Analysis of network traffic indicated that SpyToMobile communicates with IP Address using TCP over port 7766.
31 IP Address Information Registrant Org Registrar Registrar Status Domains By Proxy, LLC was found in ~11,111,910 other domains WILD WEST DOMAINS, LLC clientdeleteprohibited, clientrenewprohibited, clienttransferprohibited, clientupdateprohibited Dates Created on Expires on Updated on Name Server(s) IP Address IP Location ASN NS29.DOMAINCONTROL.COM (has 38,773,043 domains) NS30.DOMAINCONTROL.COM (has 38,773,043 domains) other sites hosted on this server - Virginia - Ashburn - Amazon.com Inc. AS14618 AMAZON-AES - Amazon.com, Inc. (registered Nov 04, 2005) Domain Status Registered And Active Website Whois History 24 records have been archived since IP History 3 changes on 4 unique IP addresses over 3 years Registrar History Hosting History Whois Server 1 registrar 1 change on 2 unique name servers over 3 years whois.wildwestdomains.com
32 Physical Acquisition Analysis Summary Google Chrome History contained evidence that the user visited and downloaded a file named: Data_backup.apk The SpyToMobile application is installed to /data/data/com.spy2mobile.light The applications folder contained a sqlite database (system.db) that stored all data collected by mspy.
33 System.db
34 How do I know if I have been infected? Use a strong passcode and limit physical access to the phone. Check visited URLs and Download history. Examine security settings and determine if Unknown Sources is enabled. Look for new and unfamiliar Widgets or Apps. If still uncertain, take a pcap!
35 Similar Work Robinson, M & Taylor, C. (2012, July). Spy vs. Spy: Examining spyware on mobile devices. Presented at Defcon 20, Las Vegas, NV. Spyware Analyzed: FlexiSpy, SpyBubble, MobiStealth, Mobile-Spy, Spyera.
36 Works Cited Krebs, B. (2015, May 14). Mobile Spyware Maker mspy Hacked, Customer Data Leaked. Retrieved from Tamma, R. & Tindall, D (2015). Learning Android Forensics. Birmingham, UK: Packt Publishing Ltd. Threat Research: Targeted Attacks on Enterprise Mobile. (2015, February). Retrieved from Whois Lookup (n.d.). Retrieved from Whois Lookup (n.d). Retrieved from
37 QUESTIONS?
Commercial Spyware-Detecting the Undetectable
1 Commercial Spyware-Detecting the Undetectable July 2015 PAGE 1 PAGE 1 1 Fidelis Cybersecurity 1601 Trapelo Road, Suite 270 Waltham, MA 02451 Commercial Spyware-Detecting the Undetectable Last fall on
Android Commercial Spyware Disease and Medication
Android Commercial Spyware Disease and Medication By Eng. Mustafa Saad Computer Engineer 2003 Mobile App Developer 2011 Mobile Security Researcher 2012 Udemy Premium Instructor 2014 March 2016 Agenda Introduction.
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic
The Leader in Cloud Security RESEARCH REPORT Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic ABSTRACT Zscaler is a cloud-computing,
Pentesting Android Mobile Application
Pentesting Android Mobile Application Overview on Mobile applications Connect in Superior Way!! Mobile market is the worldwide rapidly developing segments since many customers are using mobile phones.
Frequently Asked Questions Enterprise Mobile Manager
Frequently Asked Questions Enterprise Mobile Manager FAQ: Enterprise Mobile Manager Contents Unable to connect the device to EMM Server... 4 Symptoms... 4 Resolution... 4 Unable to import AD into EMM Server
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
Getting Started - MDM Setup
Mobile App Getting Started - MDM Setup Thank you for acquiring the Talon Mobile app. The Talon Mobile app allows you to request sensitive justice information. To use the Talon Mobile app, your agency s
THE OPEN UNIVERSITY OF TANZANIA
THE OPEN UNIVERSITY OF TANZANIA Institute of Educational and Management Technologies COURSE OUTLINES FOR DIPLOMA IN COMPUTER SCIENCE 2 nd YEAR (NTA LEVEL 6) SEMESTER I 06101: Advanced Website Design Gather
Epic Remote Access for Mobile Devices FAQ and Setup
Epic Remote Access for Mobile Devices FAQ and Setup Frequently Asked Questions: How do I request access to Epic for my mobile device? Which mobile devices are supported? What is the mobile device owner
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
Silk Test 15.0. Testing Mobile Web Applications
Silk Test 15.0 Testing Mobile Web Applications Micro Focus 575 Anton Blvd., Suite 510 Costa Mesa, CA 92626 Copyright Micro Focus 2014. All rights reserved. Portions Copyright 1992-2009 Borland Software
Malware Detection in Android by Network Traffic Analysis
Malware Detection in Android by Network Traffic Analysis Mehedee Zaman, Tazrian Siddiqui, Mohammad Rakib Amin and Md. Shohrab Hossain Department of Computer Science and Engineering, Bangladesh University
ACQUISITION AND ANALYSIS OF IOS DEVICES MATTIA EPIFANI SANS FORENSICS PRAGUE PRAGUE, 10 OCTOBER 2013
ACQUISITION AND ANALYSIS OF IOS DEVICES MATTIA EPIFANI SANS FORENSICS PRAGUE PRAGUE, 10 OCTOBER 2013 FORENSIC ACQUISITION.BEFORE STARTING When we are dealing with the forensics acquisition of an ios device
Quickstart guide to Configuring WebTitan
Quickstart guide to Configuring WebTitan 1. Install the License Once you have received the evaluation license by e-mail, you log on to WebTitan as follows using a browser as admin/hiadmin. Then navigate
Simple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
Administrator's Guide
Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere
CEH Version8 Course Outline
CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information
Mobile App User's Guide
Mobile App User's Guide Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
Monitoring mobile communication network, how does it work? How to prevent such thing about that?
Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘 維 亞 周 明 哲 劉 子 揚 (P78017058) (P48027049) (N96011156) 1 Contents How mobile communications work Why monitoring?
How To Detect An Advanced Persistent Threat Through Big Data And Network Analysis
, pp.30-36 http://dx.doi.org/10.14257/astl.2013.29.06 Detection of Advanced Persistent Threat by Analyzing the Big Data Log Jisang Kim 1, Taejin Lee, Hyung-guen Kim, Haeryong Park KISA, Information Security
EPP Status Codes: What do they mean, and why should I know?
EPP Status Codes: What do they mean, and why should I know? Extensible Provisioning Protocol (EPP) domain status codes, also called domain name status codes, indicate the status of a domain name registration.
How Attackers are Targeting Your Mobile Devices. Wade Williamson
How Attackers are Targeting Your Mobile Devices Wade Williamson Today s Agenda Brief overview of mobile computing today Understanding the risks Analysis of recently discovered malware Protections and best
Mobile Malware Network View. Kevin McNamee : Alcatel-Lucent
Mobile Malware Network View Kevin McNamee : Alcatel-Lucent Agenda Introduction How the data is collected Lies, Damn Lies and Statistics Windows PC Malware Android Malware Network Impact Examples of malware
Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013
Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Installation Guide Version 3.0
SIMS Teacher app Installation Guide Version 3.0 Step-by-step guide needed to install and configure the SIMS Teacher app service for a school Version 3.0 Information use and disclaimer The information contained
PULSE SECURE FOR GOOGLE ANDROID
DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device
Websense Certified Engineer Web Security Professional Examination Specification
Websense Certified Engineer Web Security Professional Examination Specification Introduction This is an exam specification for the Websense Certified Engineer - Web Security Professional examination. The
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014
Building a BYOD Program Using the Casper Suite Technical Paper Casper Suite v9.4 or Later 17 September 2014 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts
Protecting against Mobile Attacks
2014-APR-17 Protecting against Mobile Attacks Frankie Wong Security Analyst, HKCERT 1 Image source: http://www.techweekeurope.co.uk/news/mobile-malware-record-mcafee-125537 2 Agenda Attacks moving to mobile
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
Footprinting and Reconnaissance Tools
Footprinting and Reconnaissance Tools Topic 1: Common Port Scanning Techniques Do some research on computer ports that are most often scanned by hackers. Identify a port scanning exploit that is interesting
LogMeIn Rescue+Mobile for Android
LogMeIn Rescue+Mobile for Android Contents How to Connect to an Android Device...3 How to Start a Code Session on an Android Device...4 How to Chat with the Customer...5 How to Manage Files on a Customer's
DETERMINATION OF THE PERFORMANCE
DETERMINATION OF THE PERFORMANCE OF ANDROID ANTI-MALWARE SCANNERS AV-TEST GmbH Klewitzstr. 7 39112 Magdeburg Germany www.av-test.org 1 CONTENT Determination of the Performance of Android Anti-Malware Scanners...
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
Mobile Configuration Profiles for ios Devices Technical Note
Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note December 10, 2013 04-502-197517-20131210 Copyright 2013 Fortinet, Inc. All rights
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
SAMSUNG SMARTTV: HOW-TO TO CREATING INSECURE DEVICE IN TODAY S WORLD. Sergey Belov
Sergey Belov # whoami Penetration tester @ Digital Security Bug hunter Speaker Agenda SmartTV - what is it? Current state of research (in the world) Samsung Smart TV - series 2008-2014 Emulator vs real
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Sophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
Enterprise solution comparison chart
Enterprise solution comparison chart This quick reference compares supported devices and features across,, and Server. For the latest OS compatibility information visit www.blackberry.com/go/serverdocs
NQ Mobile Security Frequently Asked Questions (FAQs) for Android
NQ Mobile Security Frequently Asked Questions (FAQs) for Android Introducing Mobile Security NQ Mobile Security protects your mobile device against viruses and malware, while keeping your system running
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
Intel Security Certified Product Specialist McAfee Network Security Platform (NSP)
Intel Security Certified Product Specialist McAfee Network Security Platform (NSP) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking for
Networks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.
G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
The Mobile Malware Problem
The Mobile Malware Problem Eddy Willems Security Evangelist G Data Security Labs Director Security Industry Relationships - EICAR [email protected] Introduction Security Evangelist at G Data: Privately
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
More information >>> HERE <<<
More information >>> HERE http://dbvir.com/pcpandora/pdx/cc131/ Tags: pc pandora scam or work?-- vmware
Security Intelligence Services. Cybersecurity training. www.kaspersky.com
Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative
ADMINISTRATOR GUIDE FOR USA MOBILITY AMC SELECT
ADMINISTRATOR GUIDE FOR USA MOBILITY AMC SELECT AMC Select Administrator Guide 1 March 5, 2013 This page intentionally left Blank. AMC Select Administrator Guide 2 March 5, 2013 I. INTRODUCTION... 4 II.
Palo Alto Networks Users Group. February 2014
Palo Alto Networks Users Group February 2014 Topics of Discussion Syslog configuration, Integration and supported partners Panachrome App Scope Destination NAT Wildfire decision making Pan OS 6.0 brief
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
How To Plan A Desktop Workspace Infrastructure
Dell Copyright 2014 Moka5, Inc. All rights reserved. Moka5, MokaFive, LivePC, and the Moka5 logo are trademarks of Moka5, Inc. All other product or company names may be trademarks of their respective owners.
Junos Pulse Mobile Security Dashboard. User Guide. Release 4.2. February 2013 Revision 1.0. 2013, Juniper Networks, Inc.
Junos Pulse Mobile Security Dashboard User Guide Release 4.2 February 2013 Revision 1.0 2013, Juniper Networks, Inc. Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
How To Track A Cell Phone On A Cell Or Landline On A Iphone On A Pc Or Iphon On A Android Phone On Your Iphones Or Ipad On A Sim Sim Or Ipod On A Blackberry On A
Full version is >>> HERE http://dbvir.com/bccomp/pdx/cper1904/ Tags: 86819 fresh information how to install android apps on the blackberry
Software Defined Perimeter Working Group. SDP Hackathon Whitepaper
Software Defined Perimeter Working Group SDP Hackathon Whitepaper April 2014 2014 Cloud Security Alliance All Rights Reserved. All rights reserved. You may download, store, display on your computer, view,
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Sonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
Enterprise Analytics. (Also known as Pyramid Analytics or BI Office) Mobile Device Support
Enterprise Analytics (Also known as Pyramid Analytics or BI Office) Mobile Device Support Mobile Device Support Overview Enterprise Analytics provides mobile support for ios, Android and Windows Phone.
Sophos Mobile Control Installation guide. Product version: 3
Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External
Android App User Guide
www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
Samsung SDS. Enterprise Mobility Management
Samsung SDS Enterprise Mobility Samsung SDS Enterprise Mobility Faster and Safer Samsung SDS Enterprise Mobility provides stronger security for enterprise mobility without Compromising usability of mobile
Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment
Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Xperia TM T3 Exchange ActiveSync The my Xperia
Monitor Network Activity
Monitor Network Activity Panorama provides a comprehensive, graphical view of network traffic. Using the visibility tools on Panorama the Application Command Center (ACC), logs, and the report generation
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
U.S. Cellular Mobile Data Security. User Guide Version 00.01
U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4
Mobile Device Management and Security Glossary
Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes
Mobile Operating Systems & Security
Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
Samsung KNOX EMM Authentication Services. SDK Quick Start Guide
Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
Ed Ferrara, MSIA, CISSP [email protected]. Fox School of Business
MIS 5208 Week 4 Cybersecurity & Fraud Ed Ferrara, MSIA, CISSP [email protected] Hacking Source: www.youtube.com Computer Crime A cyber breach is any event that intentionally or unintentionally causes
The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends
3. The Environment Surrounding DNS DNS is used in many applications, serving as an important Internet service. Here we discuss name collision issues that have arisen with recent TLD additions, and examine
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security
Android EMM Enrollment
Android EMM Enrollment Before starting the device enrollment procedure, make sure your device is disconnected from the WUSM-Secure wireless network. Use either the Guest wireless network, or your mobile
Bypassing Firewall. @ PISA AGM Theme Seminar 2005. Presented by Ricky Lou Zecure Lab Limited
Bypassing Firewall @ PISA AGM Theme Seminar 2005 Presented by Ricky Lou Zecure Lab Limited Firewall Piercing (Inside-Out Attacks) Disclaimer We hereby disclaim all responsibility for the following hacks.
Kaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
The Incident Response Playbook for Android and ios
SESSION ID: AIR-W03R The Incident Response Playbook for Android and ios Andrew Hoog CEO and Co-founder NowSecure @ahoog42 @NowSecureMobile Andrew Hoog Author of three books Incident Response for Android
Botnets: The Advanced Malware Threat in Kenya's Cyberspace
Botnets: The Advanced Malware Threat in Kenya's Cyberspace AfricaHackon 28 th February 2014 Who we Are! Paula Musuva-Kigen Research Associate Director, Centre for Informatics Research and Innovation (CIRI)
