ggee

/ggee

About ggee

This author has not yet filled in any details.
So far ggee has created 181 blog entries.

Cleveland Security Community

Cleveland has always been an area with a constantly evolving and growing information security. Recently, it has seen a resurgence of activity and is more active than ever! There are a number of active Cleveland-area groups which meet with differing regularity. See their details below: Monthly Events CleveSec - CleveSec is an information security group [...]

September 6th, 2015|Local Meetings|0 Comments

Information Security Twitter Lists

I’m not sure about yourself, but for me I find it hard to consume information from the twitter fire hose which is why they created the lists feature. Looking around there are several lists made for information security only people, but those lists were big and only slightly reduced the noise. Over the weekend I [...]

July 14th, 2014|Site News|0 Comments

Printable Agenda for Black Hat and DEFCON

With the two big conferences (Black Hat USA and DEFCON 22) coming up, we started to look into what awesome presentations will be occurring, but we noticed that the schedule is not very printer friendly. So we spent some time to replicate the agenda and put it into a format that will print. Black Hat [...]

July 7th, 2014|Security Conferences|1 Comment

Printable Agenda for Black Hat and DEFCON

  With the two big conferences (Black Hat USA and DEFCON 21) coming up, we started to look into what awesome presentations will be occurring, but we noticed that the schedule is not very printer friendly. So we spent some time to replicate the agenda and put it into a format that will print. Black [...]

July 23rd, 2013|Security Conferences|3 Comments

Hardware Hacking Trends

Black Hat USA is coming up and while we were putting together our “must see” agenda, we noticed that there are several hardware hacking presentations this year. Here are just a few of the sessions that are hardware related: Methodologies of Hacking Embedded Security Appliances Power Analysis Attacks Colin O'Flynn BIOS Security I Can Hear [...]

July 20th, 2013|Security Conferences|0 Comments

Black Hat USA 2012 Top Picks

The schedule for this year’s Black Hat USA was recently released and we finally got a chance to inspect it and figure out what we were most excited to see. Overall there seems to be several interesting hardware (smart meter, routers, firmware, NFC, etc), mobile (iOS, Win7 phone, Android), and newish technologies (HTML5, IPv6, Windows [...]

July 8th, 2012|Security Conferences|0 Comments

CanSecWest 2010 in Pictures

CanSecWest 2010 banners Tom Gallagher and David Conger from Microsoft talk about distributed file fuzzing and the Microsoft Office 2010 security model.    Some other notes from their talk: Office supports 300 file formats. each can have different sub formats .wpd extension has 3 different parsers. fuzzing surface=huge Microsoft built their own distributed fuzzer system [...]