Spyware Discovered on All Samsung Phones

Samsung may have the highest-end options for hardware if you want an Android smartphone, but that hasn’t stopped them from making some questionable decisions on the software they sometimes load on it. Often these phones come with “default” apps that can’t be removed through ordinary means, or can’t even be …read more

Continue reading Spyware Discovered on All Samsung Phones

Reverse Engineering Liberates Dash Cam Video

If you’ve purchased a piece of consumer electronics in the last few years, there’s an excellent chance that you were forced to use some proprietary application (likely on a mobile device) to unlock its full functionality. It’s a depressing reality of modern technology, and unless you’re willing to roll your …read more

Continue reading Reverse Engineering Liberates Dash Cam Video

Thwarting the Insider Threat with Network Traffic Analysis

For decades, anyone analyzing network traffic concentrated on external network traffic, known as north-south traffic, through the perimeter via firewalls.  Although firewalls evolved to better analyze this traffic, two primary trends emerged: 1) c… Continue reading Thwarting the Insider Threat with Network Traffic Analysis

Thwarting the Insider Threat with Network Traffic Analysis

For decades, anyone analyzing network traffic concentrated on external network traffic, known as north-south traffic, through the perimeter via firewalls.  Although firewalls evolved to better analyze this traffic, two primary trends emerged: 1) c… Continue reading Thwarting the Insider Threat with Network Traffic Analysis

Capturing and Inspecting Traffic in Azure Networks

Aidan Finn teaches how to capture packets from the NICs of Azure virtual machines using Network Watcher and inspect Azure network traffic at the packet level using Wireshark.

The post Capturing and Inspecting Traffic in Azure Networks appeared first on Petri.

Continue reading Capturing and Inspecting Traffic in Azure Networks