Blog

/Blog/

Week 6 in Review – 2013

Resources "Security Engineering" now available free online - lightbluetouchpaper.org I’m delighted to announce that my book Security Engineering – A Guide to Building Dependable Distributed Systems is now available free online in its entirety. You may download any or all of the chapters from the book’s web page. The Anatomy of Unsecure Configuration: Reality Bites [...]

Week 5 in Review – 2013

Event Related Pentest & Reverse: iOS Application Hacking - esec-pentest.sogeti.com Last month, we gave some lectures about iOS application Hacking first at GreHack (Grenoble, France) and then at Hack.Lu (Luxembourg, Luxembourg). Here you will find the slides and the paper. Don't hesitate to send us your questions. Resources The Red team Mindset Course Part 1 [...]

Week 4 in Review – 2013

Event Related University Courses on Reverse Engineering and Malware Analysis - f-secure.com Today marks the commencement of the first lecture for our spring 2013 semester Reverse Engineering Malware course for the Aalto University (Espoo campus) in Finland. Resources Security Assessment of Blackberry Applications - resources.infosecinstitute.com Development of mobile applications have picked up really fast in [...]

Week 3 in Review – 2013

Event Related Offensive Defense - blog.ioactive.com I presented before the holiday break at Seattle B-Sides on a topic I called "Offensive Defense." This blog will summarize the talk. I feel it's relevant to share due to the recent discussions on desktop antivirus software (AV) [1], [2],[4], [3] Resources Red October The "Red October" Campaign - [...]

2017-03-12T17:39:42-07:00 January 21st, 2013|Security Conferences, Security Tools, Week in Review|0 Comments

Week 2 in Review – 2013

Event Related Index of Congress 29c3 - ftp.ccc.de High quality mp4 of 29c3. The 'Hack Back' Offense - bankinfosecurity.com To repel the onslaught of cyberattacks against organizations, security leaders are debating the merits of the "hack back" defense. THREADS - trailofbits.com THREADS is an annual conference that focuses on pragmatic security research and new discoveries [...]

Week 1 in Review – 2013

Event Related 29C3 29C3: When USB memory sticks lie - h-online.com USB memory sticks are thought to be among the less exciting hardware components – simple storage media that have many uses and function the same way in almost any hardware environment. 29C3: Budget mobile turns into GSM base station - h-online.com Belgian hacker Sylvain [...]

Week 52 in Review – 2012

Event Related Bootcamp - pentesterlab.com/bootcamp Bootcamp provides a learning path to get into security and especially web penetration testing. Resources Automated Open Source Intelligence (OSINT) Using APIs - raidersec.blogspot.com The first step to performing any successful security engagement is reconnaissance. How much information one is able to enumerate about given personnel (for social engineering engagements) [...]

Week 51 in Review – 2012

Resources Nils Jnemann: News about Google's Vulnerability Reward Program - nilsjuenemann.de Recently Adam Mein spoke at AppSec USA 2012 and Kevin Stadmeyer at SysScan 360 in Beijing about Google's experience with the Web Vulnerability Reward Program. Both are Security Program Manager at Google. Techniques 5 Tips to Ensure Safe Penetration Tests with Metasploit - community.rapid7.com [...]

2017-03-12T17:39:43-07:00 December 24th, 2012|Security Vulnerabilities, Week in Review|0 Comments