Vendor News

/Vendor News

Week 46 In Review – 2015

Events Related

SecureWV2015 Videos – www.irongeek.com
These are the videos of the presentations from Secure West Virginia 2015.

HouSecCon v6 2015 Videos – www.irongeek.com

New 4G LTE Hacks Punch Holes In Privacy – www.darkreading.com
Black Hat Europe researchers to demonstrate newly found flaws in 4G mobile that expose privacy and disrupt phone service.

Black Hat Europe 2015

Black Hat Europe 2015 Wrap-Up – […]

Week 43 In Review – 2015

Events Related

HouSecCon v6 2015 Videos – www.irongeek.com

Hack.lu 2015
Today started the 11th edition of hack.lu in Luxembourg. Being one of my preferred event, I drove to Luxembourg this morning direction to the Alvisse Parc hotel!

Hack.lu 2015 Wrap-Up Day #1 – blog.rootshell.be
Hack.lu 2015 Wrap-Up Day #2 – blog.rootshell.be
Hack.lu 2015 Wrap-Up Day #3 – blog.rootshell.be

BruCON – www.youtube.com
Organized in Belgium, […]

Week 42 In Review – 2015

Events Related

Videos and Slide Decks from the re:Invent 2015 Security and Compliance Track – blogs.aws.amazon.com
Whether you want to review a Security and Compliance track session you attended at re:Invent 2015, or you want to experience a session for the first time, videos and slide decks from the Security and Compliance track are now available.

Resources

Calculating the […]

Week 39 In Review – 2015

Events Related

The CIA Campaign to Steal Apple’s Secrets – theintercept.com
The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics.

Resources

Reversing Mobile Traffic Lights – www.bastibl.net
I wanted to have a look at the signal. I once heard […]

Week 37 In Review – 2015

Events Related

44CON – www.slideshare.net

BSides Augusta 2015 Videos – www.irongeek.com
Videos from the BSides Augusta conference.

Resources

Satellite Turla: APT Command and Control in the Sky – securelist.com
When you are an APT group, you need to deal with many different problems. One of them, and perhaps the biggest, is the constant seizure and takedown of domains and servers used for command-and-control […]

Week 34 In Review – 2015

Events Related

DEFCON
This year marked the 23rd DefCon, the hacker conference that began as an informal gathering for hackers to meet in person and party in the desert.

Imploding Barrels and Other Highlights From Hackfest DefCon – www.wired.com
I spent the week with over 20,000 hackers in Las Vegas — here’s what I saw – www.techinsider.io
Here is how […]

Week 33 In Review – 2015

Events Related

Kaminsky Creates Clickjacking-Killer – www.darkreading.com
Renowned security expert Dan Kaminsky here this week unveiled his latest project: a solution to eradicate so-called clickjacking attacks that plague the Web.

9th USENIX Workshop on Offensive Technologies – www.usenix.org

Black Hat USA 2015 Highlights – www.tripwire.com
The 18th annual Black Hat USA conference gathered thousands of professionals, researchers and enthusiasts to discuss […]

Week 30 In Review – 2015

Resources

Jailbreak or Root Detection: A False Sense of Security, Part 1 – bluebox.com
Mobile management vendors have ingrained in the industry that jailbroken and rooted devices are bad: automatically deny all access. There is a widespread fear in the industry that these “compromised” devices jeopardize enterprise networks and are prone to leaking corporate secrets.

Best Reverser Write-Up: […]

Week 28 In Review – 2015

Events Related

The MiTM Mobile Contest: GSM Network Down at PHDays V – blog.ptsecurity.com
The MiTM Mobile contest was held at PHDays for the first time, and it let the participants realize how easily an attacker can conduct the above-mentioned attacks having only a 10$ cell phone with some hacker freeware.

SHAKACON
SHAKACON was a well-run and friendly conference […]

Week 26 In Review – 2015

Resources

The $300 ‘PITA’ steals encryption keys with radio waves – engadget.com
Your computer is leaking information. It’s not from the usual suspects: WiFi, Bluetooth or ethernet, but from radio waves originating from your processor. Researchers at Tel Aviv University and Israel’s Technion research institute have built a $300 device that captures those electromagnetic waves and uses […]