Vendor News

/Vendor News

Week 34 In Review – 2015

Events Related

This year marked the 23rd DefCon, the hacker conference that began as an informal gathering for hackers to meet in person and party in the desert.

Imploding Barrels and Other Highlights From Hackfest DefCon –
I spent the week with over 20,000 hackers in Las Vegas — here’s what I saw –
Here is how […]

Week 33 In Review – 2015

Events Related

Kaminsky Creates Clickjacking-Killer –
Renowned security expert Dan Kaminsky here this week unveiled his latest project: a solution to eradicate so-called clickjacking attacks that plague the Web.

9th USENIX Workshop on Offensive Technologies –

Black Hat USA 2015 Highlights –
The 18th annual Black Hat USA conference gathered thousands of professionals, researchers and enthusiasts to discuss […]

Week 30 In Review – 2015


Jailbreak or Root Detection: A False Sense of Security, Part 1 –
Mobile management vendors have ingrained in the industry that jailbroken and rooted devices are bad: automatically deny all access. There is a widespread fear in the industry that these “compromised” devices jeopardize enterprise networks and are prone to leaking corporate secrets.

Best Reverser Write-Up: […]

Week 28 In Review – 2015

Events Related

The MiTM Mobile Contest: GSM Network Down at PHDays V –
The MiTM Mobile contest was held at PHDays for the first time, and it let the participants realize how easily an attacker can conduct the above-mentioned attacks having only a 10$ cell phone with some hacker freeware.

SHAKACON was a well-run and friendly conference […]

Week 26 In Review – 2015


The $300 ‘PITA’ steals encryption keys with radio waves –
Your computer is leaking information. It’s not from the usual suspects: WiFi, Bluetooth or ethernet, but from radio waves originating from your processor. Researchers at Tel Aviv University and Israel’s Technion research institute have built a $300 device that captures those electromagnetic waves and uses […]

Week 25 In Review – 2015


Circle City Con 2015 Videos –
These are the Circle City Con videos. You can watch and download the videos from here.
LastPass Security Notice –
LastPass want to assure their users that their cyberattack response worked as designed. They have received many questions so they want to take a moment and provide additional clarifications.
CVE-2015-1328: incorrect permission checks […]

Week 24 In Review – 2015


HackerOne Connects Hackers With Companies, and Hopes for a Win-Win –
HackerOne is a San Francisco tech start-up that aims to become a mediator between companies with cybersecurity issues and hackers who are looking to solve problems rather than cause them. They hope their outfit can persuade other hackers to responsibly report security flaws, rather than […]

Week 22 In Review – 2015

Events Related

HITB Amsterdam Wrap-Up Day #1 –
The HITB crew is back in the beautiful city of Amsterdam for a new edition of their security conference. Here is Xavier’s wrap-up for the first day!

HITB Amsterdam Wrap-Up Day #2
This is Xavier’s quick wrap-up for the second day of Hack in the Box!


New Research: Some Tough Questions for […]

Week 21 In Review – 2015


Inside Yubikey Neo –
Yubikey Neo is a $50 authentication token (with bells and whistles) from Yubico. Yubico advertizes it as “practically indestructible”. The product security section also claims that the device comes in a “tamper-proof casing” that is “practically impossible to tamper”. –
Strong Ciphers for Apache, nginx and Lighttpd. These examples are meant for sysadmins […]

Week 20 In Review – 2015


Week of PowerShell Shells – Announcement and Day 1 –
To generate awareness and spread the goodness of PowerShell in the infosec community, Nikhil is glad to announce a Week of PowerShell shells. On each day of the past week, from 11th May to 15th May 2015, Nikhil published/discussed a blog post on it.

Week of PowerShell […]