Roxanne

/Roxanne

About Roxanne

This author has not yet filled in any details.
So far Roxanne has created 84 blog entries.

Week 36 in Review – 2012

Resources Elderwood Project 'Elderwood' Crew, Tied to Google Aurora Attack, Targeting Defense, Energy, Finance Companies - threatpost.com The same team that attacked Google in the Aurora campaign in 2009 is still active and has been conducting a long-term campaign targeting defense contractors, financial services companies, energy companies, human rights organizations and government agencies using a [...]

Week 33 in Review – 2012

Event Related USENIX Technical Sessions - usenix.org The full 21st USENIX Security Symposium Proceedings are now available. Workshop Program for HotSec'12 - usenix.org All sessions will be held in the Auditorium unless otherwise noted. Workshop Program for Foci'12 - usenix.org This is the workshop program for the FOCI'12. Workshop Program for HealthSec'12 - usenix.org All [...]

Week 32 in Review – 2012

Event Related DefCon 20 Defcon Wi-Fi hack called no threat to enterprise WLANs - networkworld.com Enterprise Wi-Fi networks can keep using WPA2 security safely, despite a recent Defcon exploit that has been widely, but wrongly, interpreted as rendering it useless. Is WPA2 Security Broken Due to Defcon MS-CHAPv2 Cracking? - revolutionwifi.blogspot.ca A lot of press [...]

Week 31 in Review – 2012

Event Related DEFCON 20 DEFCON 20: Day 2 Interesting Presentations - it.toolbox.com Day 2 of DEFCON, and things are jamming. There is a tremendous amount of energy at this 20 year celebration of the Con. People are behaving, and the talks are pretty interesting. Defcon Day 2 Talk Notes – The DCWG Debriefing - novainfosecportal.com [...]

Week 30 in Review – 2012

Event Related Black Hat USA 2012 BlackHat USA 2012: Day One - it.toolbox.com Carrying on with my tradition of posting my notes from each session I attend... I present to you the first day of BlackHat Briefings 2012. Black Hat Day 1 Talk Notes – STIX: The Structured Threat Information eXpression - novainfosecportal.com This Turbo [...]

Week 29 in Review – 2012

Event Related Bsides Cleveland 2012 Videos - irongeek.com These are the videos from the Bsides Cleveland conference. Resources Hashcat Per Position Markov Chains - blog.spiderlabs.com The Markov model is a mathematical system that has had numerous uses and variations since it’s inception over a hundred years ago. Most notable, in terms of computer science, is [...]

Week 28 in Review – 2012

Event Related S16 Networks: Presentations - si6networks.com The complete list of our presentations is available here. Resources Low Hanging Fruit - averagesecurityguy.info I decided to write a Python script to automate this task for me. Lhf.py takes a single Nessus v2 XML file and prints a summary HTML file with all of the low hanging [...]

Week 27 in Review – 2012

Event Related Layer One 2012 Security Conference - layerone.org All of the videos from the LayerOne 2012 security conference are now online! Check everything out on the 2012 Archives page. RECON 2012 – GPUS FOR MOBILE MALWARE, MITIGATION AND MORE - viaforensics.com The following presentation was delivered by Jared Carlson at REcon 2012 on June [...]