Roxanne

/Roxanne

About Roxanne

This author has not yet filled in any details.
So far Roxanne has created 84 blog entries.

Week 4 in Review – 2013

Event Related University Courses on Reverse Engineering and Malware Analysis - f-secure.com Today marks the commencement of the first lecture for our spring 2013 semester Reverse Engineering Malware course for the Aalto University (Espoo campus) in Finland. Resources Security Assessment of Blackberry Applications - resources.infosecinstitute.com Development of mobile applications have picked up really fast in [...]

Week 3 in Review – 2013

Event Related Offensive Defense - blog.ioactive.com I presented before the holiday break at Seattle B-Sides on a topic I called "Offensive Defense." This blog will summarize the talk. I feel it's relevant to share due to the recent discussions on desktop antivirus software (AV) [1], [2],[4], [3] Resources Red October The "Red October" Campaign - [...]

2017-03-12T17:39:42-07:00 January 21st, 2013|Security Conferences, Security Tools, Week in Review|0 Comments

Week 2 in Review – 2013

Event Related Index of Congress 29c3 - ftp.ccc.de High quality mp4 of 29c3. The 'Hack Back' Offense - bankinfosecurity.com To repel the onslaught of cyberattacks against organizations, security leaders are debating the merits of the "hack back" defense. THREADS - trailofbits.com THREADS is an annual conference that focuses on pragmatic security research and new discoveries [...]

Week 1 in Review – 2013

Event Related 29C3 29C3: When USB memory sticks lie - h-online.com USB memory sticks are thought to be among the less exciting hardware components – simple storage media that have many uses and function the same way in almost any hardware environment. 29C3: Budget mobile turns into GSM base station - h-online.com Belgian hacker Sylvain [...]

Week 52 in Review – 2012

Event Related Bootcamp - pentesterlab.com/bootcamp Bootcamp provides a learning path to get into security and especially web penetration testing. Resources Automated Open Source Intelligence (OSINT) Using APIs - raidersec.blogspot.com The first step to performing any successful security engagement is reconnaissance. How much information one is able to enumerate about given personnel (for social engineering engagements) [...]

Week 51 in Review – 2012

Resources Nils Jnemann: News about Google's Vulnerability Reward Program - nilsjuenemann.de Recently Adam Mein spoke at AppSec USA 2012 and Kevin Stadmeyer at SysScan 360 in Beijing about Google's experience with the Web Vulnerability Reward Program. Both are Security Program Manager at Google. Techniques 5 Tips to Ensure Safe Penetration Tests with Metasploit - community.rapid7.com [...]

2017-03-12T17:39:43-07:00 December 24th, 2012|Security Vulnerabilities, Week in Review|0 Comments

Week 50 in Review – 2012

Event Related Legal Merits of 'Hack Back' Strategy - bankinfosecurity.com From point-of-sale hacks to malware and DDoS attacks, the top cyberthreats of 2012 have been aggressive and strong. Is it time for organizations to adopt a "hack back" strategy against perceived attackers? Resources Mitigating Targeted Attacks on Your Organization - blogs.technet.com The Trustworthy Computing blog [...]

Week 49 in Review – 2012

Event Related SANS SANS SEC642: Advanced Web App Penetration Testing and Ethical Hacking (review) - blog.c22.cc After taking a year off from SANS London (a trip to Colombia was too much to resist last year), I flew back over to sunny London (ha) to attend the new SEC642: Advanced Web App Penetration Testing class with [...]

Week 48 in Review – 2012

Event Related Hacker Internship - nds.ruhr-uni-bochum.de Web applications are in the age of Web 2.0 increasingly become the target of attackers. Thus no problem SQL injection foreign databases are compromised, stolen by XSS vulnerability browser sessions and via cross-site request forgery you get from one day to the countless new friends in a social network. [...]

2017-03-12T17:39:43-07:00 December 3rd, 2012|Security Conferences, Security Tools, Week in Review|0 Comments

Week 47 in Review – 2012

Event Related DOAG 2012: Best of Oracle Security 2012 - blog.red-database-security.com Yesterday I gave a presentation ”Best of Oracle Security 2012” at the DOAG 2012 conference in Nürnberg. Resources cfbackdoor - gironsec.com This is a text file. Tools Util Util - Windows Handles Viewer (Simple GUI with REPL) v1.0.exe - diniscruz.blogspot.com Based on the Util [...]

2017-03-12T17:39:43-07:00 November 26th, 2012|Security Conferences, Security Tools, Week in Review|0 Comments