Security Vulnerabilities

Week 35 In Review – 2014


InfowarCon TV –
Here are some of the amazing talks given in January. InfowarCon TV highly suggest you listen to them all; lots of great information, questions, and demonstrations about the most important issues facing us today.
Shakacon LLC –
Shakacon, an Information Technology (IT) Security Conference. Here are some of the talks at the conference. You […]

September 1st, 2014|Security Training, Security Vulnerabilities, Week in Review|0 Comments

Week 34 In Review – 2014

Events Related

USENIX Security ’14 Technical Sessions –
The full Proceedings published by USENIX for the symposium are available for download here. Individual papers can also be downloaded from the presentation page.

WOOT ’14 Workshop Program
The full papers published by USENIX for the workshop are available for download as an archive or individually below.

DEF CON 22 ICS […]

Week 33 In Review – 2014

Events Related

Def Con 22

DEFCON 22: The Con That Keeps on Giving –
Luna Lindsey is redefining the conference experience. She had an amazing time this year, as always. But as a neophile, she crave new experiences.
Def Con: the ‘Olympics of hacking’ –
Welcome to Def Con, the Olympics of hacking, where for 21 years computer hackers […]

Week 32 In Review – 2014


Introducing LiveDump.exe –
Microsoft has added back the ability to dump physical memory to disk (in the form of a dump file) from user mode via NtSystemDebugControl. Sippy wrote a quick proof-of-concept tool and generated what appears to be a 250mb kernel bitmap dump.
About the USB Descriptor Collection –
This site tries to build a collection […]

August 12th, 2014|Security Tools, Security Vulnerabilities, Week in Review|0 Comments

Week 31 In Review – 2014


REcon 2014 Videos –
REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. Here is the index of REcon 2014 videos. Watch and download the videos from here.
RVAsec 2014 Videos –
Miss a talk or even the entire conference? No problem! All of the speaker videos and presentations are […]

Week 30 In Review – 2014


BSides Cleveland 2014 Videos –
These are the videos from the Bsides Cleveland conference. You can watch and download the videos from here.
Dispelling Confusion and Myths: iOS Proof-of-Concept –
A quick POC demonstrating how File Relay and other services can be abused to dump a significant amount of personal data from an iOS device wirelessly, and […]

Week 29 In Review – 2014


BGA talk slides –
Marshall twitted his BGA talk slides on twitter. You can download the pdf from here.
Building a Modern Security Engineering Organization –
Continuous deployment and the DevOps philosophy have forever changed the ways in which businesses operate. This talk with discuss how security adapts effectively to these changes.
Car Hacker’s Handbook –
Here you can […]

Week 28 In Review – 2014


Vendor Checklist app / Trust Metric app –
ISECOM (the Institute for Security and Open Methodologies) began with the release of the OSSTMM, the Open Source Security Testing Methodology Manual. It was a move to improve how security was tested and implemented.
Dumping Data from Memcached Servers –
Memcached servers provide a dynamic, distributed memory object caching […]

Week 26 In Review – 2014

Black Hat USA Briefings Giveaway
Enter to win an Black Hat USA 2014 Briefings ticket worth
$2,2000 from Infosec Events
Events Related

Hack in Paris 2014 Wrap-Up Day #1 –
Hack in Paris, a French security conference held in Disneyland Resort Paris. The conference started with a sunny sky over the conference centre in the New York hotel. Here […]

Week 25 In Review – 2014


Circle City Con 2014 Videos –
These are the Circle City Con 2014 videos. You can watch and download all of the recordings from here.
OWASP Security Shepherd –
Security Shepherd has been implemented with the aim of fostering and improving security awareness among a varied skill-set demographic. This project enables users to learn or to improve […]