Blog

/Blog/

Week 31 In Review – 2014

Resources REcon 2014 Videos – recon.cx REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. Here is the index of REcon 2014 videos. Watch and download the videos from here. RVAsec 2014 Videos – rvasec.com Miss a talk or even the entire conference? No problem! All of the speaker videos [...]

Week 30 In Review – 2014

Resources BSides Cleveland 2014 Videos – irongeek.com These are the videos from the Bsides Cleveland conference. You can watch and download the videos from here. Dispelling Confusion and Myths: iOS Proof-of-Concept – zdziarski.com A quick POC demonstrating how File Relay and other services can be abused to dump a significant amount of personal data from an iOS [...]

Week 29 In Review – 2014

Resources BGA talk slides – twitter.com Marshall twitted his BGA talk slides on twitter. You can download the pdf from here. Building a Modern Security Engineering Organization – slideshare.net Continuous deployment and the DevOps philosophy have forever changed the ways in which businesses operate. This talk with discuss how security adapts effectively to these changes. Car Hacker's [...]

Week 28 In Review – 2014

Resources Vendor Checklist app / Trust Metric app – archon.thewatchers.net ISECOM (the Institute for Security and Open Methodologies) began with the release of the OSSTMM, the Open Source Security Testing Methodology Manual. It was a move to improve how security was tested and implemented. Dumping Data from Memcached Servers – breenmachine.blogspot.com Memcached servers provide a dynamic, distributed [...]

Information Security Twitter Lists

I’m not sure about yourself, but for me I find it hard to consume information from the twitter fire hose which is why they created the lists feature. Looking around there are several lists made for information security only people, but those lists were big and only slightly reduced the noise. Over the weekend I [...]

2017-03-12T17:39:30-07:00 July 14th, 2014|Site News|0 Comments

Printable Agenda for Black Hat and DEFCON

With the two big conferences (Black Hat USA and DEFCON 22) coming up, we started to look into what awesome presentations will be occurring, but we noticed that the schedule is not very printer friendly. So we spent some time to replicate the agenda and put it into a format that will print. Black Hat [...]

2014-07-07T19:08:34-07:00 July 7th, 2014|Security Conferences|1 Comment

Week 27 In Review – 2014

Black Hat USA Briefings Giveaway Enter to win an Black Hat USA 2014 Briefings ticket worth $2,2000 from Infosec Events Events Related School on Applications of Open Spectrum and White Spaces Technologies - Schedule – wireless.ictp.it ICTP School on Applications of Open Spectrum and White Spaces Technologies - 2014 workshop schedule is available here. You can [...]

Week 26 In Review – 2014

Black Hat USA Briefings Giveaway Enter to win an Black Hat USA 2014 Briefings ticket worth $2,2000 from Infosec Events Events Related Hack in Paris 2014 Wrap-Up Day #1 – blog.rootshell.be Hack in Paris, a French security conference held in Disneyland Resort Paris. The conference started with a sunny sky over the conference centre in the [...]