md

/md

About md

This author has not yet filled in any details.
So far md has created 92 blog entries.

Week 44 In Review – 2014

Events Related Inside BlackHat Europe 2014 – blog.fortinet.com The conference started with Adi Shamir's keynote. Axelle Apvrille was really happy to listen to such a brilliant mind like Adi Shamir. In this blog post, Axelle has given his personal opinion on some of the best talks he attended. Resources Social-Engineer, Inc. Releases Annual Report on DEF [...]

Week 43 In Review – 2014

Events Related Hack.lu 2014 Wrap-Up Day #1 – blog.rootshell.be After attending BlackHat last week in Amsterdam, Xavier is now in Luxembourg until Friday to attend the 10th edition of Hack.lu. here is Xavier’s wrap-up for the first day. As usual, the first day started via a first bunch of workshops. Hack.lu 2014 Wrap-Up Day #2 – blog.rootshell.be [...]

Week 42 In Review – 2014

Events Related BlackHat Europe 2014 Wrap-Up Day #1 – blog.rootshell.be BlackHat is back in Amsterdam and here is Xavier's wrap-up for the first day. The day started with the Adi Shamir’s keynote and some crypto. BlackHat Europe 2014 Wrap-Up Day #2 – blog.rootshell.be Here is Xavier's small wrap-up for the second BlackHat day. His first choice was [...]

Week 41 In Review – 2014

Resources nullcon Goa 2014: Pentesting Proprietary RF Communications by Justin Searle – youtube.com This talk will demonstrate practical techniques to identify, assess, and exploit a subclass of control systems found in your companies that use proprietary RF communications, such as fire alarms, proximity cards, automotive security gates, car alarms, conference rooms, and building automation systems. The [...]

2017-03-12T17:39:29-07:00 October 13th, 2014|Security Vulnerabilities, Site News, Week in Review|0 Comments

Week 40 In Review – 2014

Resources SLouisville Infosec 2014 Videos – irongeek.com Here are the videos from the Louisville Infosec 2014 conference. You can download the videos from here. Derbycon 2014 Videos – irongeek.com These are the videos of the presentations from Derbycon 2014. You can watch and download the videos from here. Shellshocker! – Episode 029a – in-security.org You might have head [...]

Week 39 In Review – 2014

Resources (IN)Secure Magazine issue 43 (September 2014) available – net-security.org (IN)SECURE Magazine is a freely available digital security magazine discussing some of the hottest information security topics. You can download it now. A Guide to Gary McGraw's AppsecUSA Keynote – cigital.com Here is a quick guide to the key ideas in the talk. Hope you find this [...]

Week 38 In Review – 2014

Events Related A first-timers view of the “Hacker Summer Camp” – blog.c22.cc The big "Hacker Summer Camp" took place in Las Vegas this August. This get-together describes the occasion of Black Hat, for the Business sponsored InfoSec employee, BSides Las Vegas, for the techies, and DEF CON, which apparently became object of both type of folks [...]

Week 37 In Review – 2014

Events Related ArchC0n ’14 Report – www.digitalbond.com Dale Peterson spoke at the inaugural ArchC0n in St. Louis this Saturday. The main reason he chose to go to this IT security event was they had Richard Bejtlich, Bruce Schneier and Charlie Miller as keynotes. Quite a haul for the first run. Here are some of the items [...]

Week 36 In Review – 2014

Resources iCloud keychain and iOS 7 Data Protection – slideshare.net If you are concerned about cloud security, read this presentation by Andrey Belenko Sr. Security Engineer @ viaForensics and Alexey Troshichev @hackappcom founder. Leveraging WMI for shells – secabstraction.com secabstraction always try to think about how he might get something done by leveraging WMI, since it's usually [...]

Week 35 In Review – 2014

Resources InfowarCon TV – infowarcon.com Here are some of the amazing talks given in January. InfowarCon TV highly suggest you listen to them all; lots of great information, questions, and demonstrations about the most important issues facing us today. Shakacon LLC – www.youtube.com Shakacon, an Information Technology (IT) Security Conference. Here are some of the talks at [...]

2017-03-12T17:39:29-07:00 September 1st, 2014|Security Training, Security Vulnerabilities, Week in Review|0 Comments