Blog

/Blog/

Week 30 In Review – 2015

Resources Jailbreak or Root Detection: A False Sense of Security, Part 1 - bluebox.com Mobile management vendors have ingrained in the industry that jailbroken and rooted devices are bad: automatically deny all access. There is a widespread fear in the industry that these “compromised” devices jeopardize enterprise networks and are prone to leaking corporate secrets. [...]

Week 29 In Review – 2015

Events Related Black Hat attendee report highlights the mess we're in - zdnet.com Black Hat has released its first-ever attendee research report, highlighting infosec's ongoing hiring crisis and a sector that feels poorly prepared to face current threats. How We Fared in the Cyber Grand Challenge - blog.trailofbits.com The Cyber Grand Challenge qualifying event was held [...]

Week 28 In Review – 2015

Events Related The MiTM Mobile Contest: GSM Network Down at PHDays V - blog.ptsecurity.com The MiTM Mobile contest was held at PHDays for the first time, and it let the participants realize how easily an attacker can conduct the above-mentioned attacks having only a 10$ cell phone with some hacker freeware. SHAKACON SHAKACON was a [...]

Week 27 In Review – 2015

Events Related REcon Recap: Here’s What Caught My Eye - researchcenter.paloaltonetworks.com A few weeks ago I was fortunate enough to attend REcon in Montreal, Canada. This conference focuses on reverse engineering and exploitation techniques and has been going on for roughly a decade. PHDays V Highlights: Signs of GSM Interception, High Time to Hack Wi-Fi, Future of [...]

Week 26 In Review – 2015

Resources The $300 'PITA' steals encryption keys with radio waves - engadget.com Your computer is leaking information. It's not from the usual suspects: WiFi, Bluetooth or ethernet, but from radio waves originating from your processor. Researchers at Tel Aviv University and Israel's Technion research institute have built a $300 device that captures those electromagnetic waves [...]

Week 25 In Review – 2015

Resources Circle City Con 2015 Videos – irongeek.com These are the Circle City Con videos. You can watch and download the videos from here. LastPass Security Notice – blog.lastpass.com LastPass want to assure their users that their cyberattack response worked as designed. They have received many questions so they want to take a moment and provide additional [...]

Week 24 In Review – 2015

Resources HackerOne Connects Hackers With Companies, and Hopes for a Win-Win – nytimes.com HackerOne is a San Francisco tech start-up that aims to become a mediator between companies with cybersecurity issues and hackers who are looking to solve problems rather than cause them. They hope their outfit can persuade other hackers to responsibly report security flaws, [...]

Week 23 In Review – 2015

Events Related BSidesLondon 2015 Wrap-Up – blog.rootshell.be Here is a quick wrap-up of the BSidesLondon 2015 by Xavier. This year, they moved to a new location close to Earls Court where is organized InfoSec Europe at the same time. WAF Bypass at Positive Hack Days V – blog.ptsecurity.com Though the contest WAF configuration allowed bypassing, uncommon solutions [...]