Blog

/Blog/

Week 17 In Review – 2014

Resources Verizon Data Breach Investigations Report – verizonenterprise.com The 2014 Data Breach Investigations Report (DBIR) casts new light on threats — taking 10 years of forensic data and finding that 92% of these can be categorized into nine basic attack patterns. This approach also helps identify primary threats to your industry, which you can analyze to [...]

Week 16 In Review – 2014

Events Related Highlights from the SyScan 2014 Conference – symantec.com David Maciejak recently attended the Symposium on Security for Asia Network (SyScan), an annual conference held in Singapore, which brings together computer security researchers from around the world. This year, security myths were dispelled and several interesting topics were discussed at the conference. The following is [...]

Week 15 In Review – 2014

Events Related Enter to win an INFILTRATE security conference ticket worth $2,2000 from Hacker Warehouse – hackerwarehouse.com INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. Groundbreaking researchers focused on the latest technical issues will demonstrate techniques that you cannot find elsewhere. Conference is being held on May 15 and 16 in [...]

Week 14 In Review – 2014

Resources Everything You Always Wanted to Know About iTunes and iCloud Backups But Were Afraid to Ask – blog.crackpassword.com Do you think you know everything about creating and using backups of Apple iOS devices? Probably not. Here Vladimir Bezmaly (MVP Consumer security, Microsoft Security Trusted Advisor) shares some thoughts, tips and tricks on iTunes and iCloud [...]

2017-03-12T17:39:32-07:00 April 7th, 2014|Security Tools, Security Training, Week in Review|0 Comments

Week 13 In Review – 2014

Resources iOS Application Security Part 32 - Automating Tasks With iOS Reverse Engineering Toolkit (iRET) – highaltitudehacks.com In this article, we will talk about a new tool named iOS Reverse Engineering Toolkit (iRET) that has just been released to assist penetration testers in automating most of the tasks involved in a iOS penetration test. The project [...]

Week 12 In Review – 2014

Events Related Three Things to Take Away from CanSecWest, Pwn2Own – threatpost.com Browsers, brokers and BIOS: you could safely call that triumvirate the past, present and future of security, but you’d be wrong. If last week’s CanSecWest conference, and Pwn2Own and Pwnium contests are indeed a point-in-time snapshot of the technical side of information security, then [...]

Week 11 In Review – 2014

Events Related Pwn2Own 2014: A recap – hp.com Two record-setting days of payouts for zero-day vulnerabilities brought the 2014 Pwn2Own contest tantalizingly close to the first million-dollar competition, with $850,000 paid to eight entrants. $385,000 of potential prize money remained unclaimed. Researchers pocket record $400K at Pwn2Own hacking contest's first day – computerworld.com Researchers on Wednesday cracked [...]

Week 9 In Review – 2014

Events Related RSA Conference 2014 RSA protests by DEF CON groups, Code Pink draw ire – news.cnet.com The RSA security conference (where the world's security companies come to do business with each other), opened its doors this week in San Francisco to a wide range of protests by security professionals who would otherwise be attending and [...]