Vendor News

/Vendor News

Week 39 In Review – 2015

Events Related

The CIA Campaign to Steal Apple’s Secrets –
The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics.


Reversing Mobile Traffic Lights –
I wanted to have a look at the signal. I once heard […]

Week 37 In Review – 2015

Events Related

44CON –

BSides Augusta 2015 Videos –
Videos from the BSides Augusta conference.


Satellite Turla: APT Command and Control in the Sky –
When you are an APT group, you need to deal with many different problems. One of them, and perhaps the biggest, is the constant seizure and takedown of domains and servers used for command-and-control […]

Week 34 In Review – 2015

Events Related

This year marked the 23rd DefCon, the hacker conference that began as an informal gathering for hackers to meet in person and party in the desert.

Imploding Barrels and Other Highlights From Hackfest DefCon –
I spent the week with over 20,000 hackers in Las Vegas — here’s what I saw –
Here is how […]

Week 33 In Review – 2015

Events Related

Kaminsky Creates Clickjacking-Killer –
Renowned security expert Dan Kaminsky here this week unveiled his latest project: a solution to eradicate so-called clickjacking attacks that plague the Web.

9th USENIX Workshop on Offensive Technologies –

Black Hat USA 2015 Highlights –
The 18th annual Black Hat USA conference gathered thousands of professionals, researchers and enthusiasts to discuss […]

Week 30 In Review – 2015


Jailbreak or Root Detection: A False Sense of Security, Part 1 –
Mobile management vendors have ingrained in the industry that jailbroken and rooted devices are bad: automatically deny all access. There is a widespread fear in the industry that these “compromised” devices jeopardize enterprise networks and are prone to leaking corporate secrets.

Best Reverser Write-Up: […]

Week 28 In Review – 2015

Events Related

The MiTM Mobile Contest: GSM Network Down at PHDays V –
The MiTM Mobile contest was held at PHDays for the first time, and it let the participants realize how easily an attacker can conduct the above-mentioned attacks having only a 10$ cell phone with some hacker freeware.

SHAKACON was a well-run and friendly conference […]

Week 26 In Review – 2015


The $300 ‘PITA’ steals encryption keys with radio waves –
Your computer is leaking information. It’s not from the usual suspects: WiFi, Bluetooth or ethernet, but from radio waves originating from your processor. Researchers at Tel Aviv University and Israel’s Technion research institute have built a $300 device that captures those electromagnetic waves and uses […]

Week 25 In Review – 2015


Circle City Con 2015 Videos –
These are the Circle City Con videos. You can watch and download the videos from here.
LastPass Security Notice –
LastPass want to assure their users that their cyberattack response worked as designed. They have received many questions so they want to take a moment and provide additional clarifications.
CVE-2015-1328: incorrect permission checks […]

Week 24 In Review – 2015


HackerOne Connects Hackers With Companies, and Hopes for a Win-Win –
HackerOne is a San Francisco tech start-up that aims to become a mediator between companies with cybersecurity issues and hackers who are looking to solve problems rather than cause them. They hope their outfit can persuade other hackers to responsibly report security flaws, rather than […]

Week 22 In Review – 2015

Events Related

HITB Amsterdam Wrap-Up Day #1 –
The HITB crew is back in the beautiful city of Amsterdam for a new edition of their security conference. Here is Xavier’s wrap-up for the first day!

HITB Amsterdam Wrap-Up Day #2
This is Xavier’s quick wrap-up for the second day of Hack in the Box!


New Research: Some Tough Questions for […]