Black Hat USA Briefings Giveaway
Enter to win an Black Hat USA 2014 Briefings ticket worth
$2,2000 from Infosec Events
Events Related
- School on Applications of Open Spectrum and White Spaces Technologies – Schedule – wireless.ictp.it
ICTP School on Applications of Open Spectrum and White Spaces Technologies – 2014 workshop schedule is available here. You can download all of the presentations from here.
Resources
- Black Hat USA 2014 – Arsenal Tools Speaker List – www.blackhat.com
Returning bigger than ever for 2014, Black Hat is pleased to once again present Arsenal–a Tool/Demo area where independent researchers and the open source community will showcase some awesome weapons. See inside for the full list and descriptions of each of these tools. - Pen Testing Scripts – commonexploits.com
Daniel Compton has created quite a few new scripts over the last year that he has finally shared. Here is a list of tools you can find and a brief overview of what they do.
Tools
- OWASP iOSForensic v1.0 Released – github.com
iosForensic is a python tool to help in forensics analysis on iOS. It get files, logs, extract sqlite3 databases and uncompress .plist files in xml.
Techniques
- Episode #179: The Check is in the Mail – blog.commandlinekungfu.com
Bob Meckle has recently come across a situation where it would be greatly beneficial to build a script to check revocation dates on certificates issued using a certain template, and send an email to their certificate staff letting them know which certificates will expire within the next 6 weeks. - IOS App Testing – Part 2 – hackwhackandsmack.com
The information available clearly details credit card information and pins normally secured, proving nothing is safe if your phone is rooted! - Unpacking Applications – www.solutionary.com
In this post, Michael Born has demonstrated the ease with which iOS applications can be decrypted and reverse engineered, allowing access to the classes used within the application.
Other News
- Rising Use of Encryption Foiled the Cops a Record 9 Times in 2013 – www.wired.com
In nine cases in 2013, state police were unable to break the encryption used by criminal suspects they were investigating, according to an annual report on law enforcement eavesdropping released by the U.S. court system on Wednesday. - As security startups heat up, a reminder that security is not a product or service: it’s a value – gigaom.com
There’s a lot of funding going on in security these days, but it’s hard to tell whether or not these new services are actually going to help things. It’s more important to focus on integrating proper security measures within your organization rather than relying on an outside system to do the work for you.
Leave A Comment