1. Mobile Security: Your SIM card & mobile phone can identify you! Russian subtitles

    02:56

    from Tibet Action Institute / Added

    2 Plays / / 0 Comments

    Changing your SIM card is not enough to avoid being identified -- every mobile phone has a unique number! Change your phone AND your SIM card if you need to be safe. For more information, visit:…

    + More details
    • Mobile Security: Your SIM card & mobile phone can identify you! Arabic subtitles

      02:56

      from Tibet Action Institute / Added

      5 Plays / / 0 Comments

      Changing your SIM card is not enough to avoid being identified -- every mobile phone has a unique number! Change your phone AND your SIM card if you need to be safe. For more information, visit:…

      + More details
      • Mobile Security: Your SIM card & mobile phone can identify you! French subtitles

        02:56

        from Tibet Action Institute / Added

        3 Plays / / 0 Comments

        Changing your SIM card is not enough to avoid being identified -- every mobile phone has a unique number! Change your phone AND your SIM card if you need to be safe. For more information, visit:…

        + More details
        • Rockland College International

          00:55

          from rockland / Added

          512 Plays / / 0 Comments

          Department of Cyber Security & Research Executive Certificate in Cyber Security (ECCS) Tous Protocol Certification (TPC) Cloud Computing Bundles (CCB) Certified Web Penetration Engineer (CWE) Certified…

          + More details
          • Digitaler Salon: Cloud Computing und Cyber Security – eine Illusion?

            58:38

            from kooperative-berlin / Added

            133 Plays / / 0 Comments

            Auch auf kultureller Ebene verändert Cloud Computing einiges. Mit der Cloud geht der Trend weg vom Besitz von Daten im klassischen Sinne. Ist „meins“ und „deins“ bald abgeschafft? Entmaterialisiert…

            + More details
            • Oxford Martin Global Cyber Security Capacity Center Launch - Dr. David A. Bray, Speaker and Panel

              42:42

              from R1o / Added

              21 Plays / / 0 Comments

              Oxford Martin Global Cyber Security Capacity Center Launch - Dr. David A. Bray, Speaker and Panel - http://www.oii.ox.ac.uk/events/?id=641 http://www.oxfordmartin.ox.ac.uk/ Filmed on November 25, 2013

              + More details
              • Shell LiveWIRE 2013 CoBlue Cybersecurity

                02:22

                from Syntens / Added

                28 Plays / / 0 Comments

                Secure Grid vergroot beschikbaarheid, flexibiliteit en schaalbaarheid van ICT Het komt steeds vaker voor dat concurrentie- of privacygevoelige informatie onbedoeld openbaar wordt gemaakt. Reputatieschade…

                + More details
                • CNS Hut3 - bypassing logon with SQL injection

                  00:46

                  from CNS Group / Added

                  5 Plays / / 0 Comments

                  CNS Hut3 Test Team demonstrate how to bypass application login pages using SQL Injection

                  + More details
                  • CNS Hut3 - Finding Credentials in Android

                    01:01

                    from CNS Group / Added

                    2 Plays / / 0 Comments

                    CNS Hut3 Test Team show how to find credentials in unsecured android devices.

                    + More details
                    • Securing a Smarter Planet

                      02:30

                      from IBM Curiosity Shop / Added

                      6 Plays / / 0 Comments

                      + More details

                      What are Tags?

                      Tags

                      Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."