1. ReVuln - The TV is watching you


    from ReVuln / Added

    175K Plays / / 0 Comments

    In this video we demonstrate one of our 0-day vulnerabilities affecting Smart TV, in this case a Samsung TV LED 3D. Smart TV can be used to browse the internet, use social networks, purchase movies and do many other things. This demo shows how a vulnerability for such devices can be used to retrieve sensitive information, monitor and root the device itself remotely. (http://twitter.com/revuln - http://revuln.com)

    + More details
    • ResCompTV presents "Spying on Spies"


      from ResCompTV / Added

      59 Plays / / 0 Comments

      Here at the University of Michigan, we deal with plenty of sensitive data. How can we work to keep all that data secure? Watch and find out some key steps you can take to protect sensitive data.

      + More details
      • Colin Robbins of Nexor Ltd interviewed by the mimovi team.


        from RPPtv Ltd / Added

        25 Plays / / 0 Comments

        Colin Robbins of Nexor Ltd explains how they manage sensitive data in both the cloud and G-cloud. This is especially important for Government who hold about 20% of sensitive data and cannot have that compromised. Producer: Will Buchanan

        + More details
        • Methods to manage the quality of sensitive biodiversity data


          from GBIF / Added

          24 Plays / / 1 Comment

          Meherzad Romer, Senior Data Manager at NatureServe Canada talks about the particularities of sensitive biodiversity data, and how to manage them in a digital environment. This video was recorded during the training sessions associated to the 18th meeting of the GBIF Governing Board in Buenos Aires (Argentina) in October 2011. Full description available at http://www.gbif.org/orc/?doc_id=4446.

          + More details

          What are Tags?


          Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."