Blog

/Blog/

Week 27 in Review – 2012

Event Related Layer One 2012 Security Conference - layerone.org All of the videos from the LayerOne 2012 security conference are now online! Check everything out on the 2012 Archives page. RECON 2012 – GPUS FOR MOBILE MALWARE, MITIGATION AND MORE - viaforensics.com The following presentation was delivered by Jared Carlson at REcon 2012 on June [...]

Black Hat USA 2012 Top Picks

The schedule for this year’s Black Hat USA was recently released and we finally got a chance to inspect it and figure out what we were most excited to see. Overall there seems to be several interesting hardware (smart meter, routers, firmware, NFC, etc), mobile (iOS, Win7 phone, Android), and newish technologies (HTML5, IPv6, Windows [...]

2012-07-08T16:24:45-07:00 July 8th, 2012|Security Conferences|0 Comments

Week 26 in Review – 2012

Event Related Workshop on the Economics of Information Security 2012 - lightbluetouchpaper.org I’m liveblogging WEIS 2012, as I did in 2011, 2010 and 2009. The event is being held today and tomorrow at the Academy of Sciences in Berlin. Blackhat Arsenal Tools Vegas 2012 LineUp - toolswatch.org I’m very pleased to announce that Blackhat Team [...]

Week 24 in Review – 2012

Event Related Recon 2012 Review – Exploit the Magic School Bus to Success - infosecalways.com Hands down Day 1 of Recon the Magic Bus by Travis Goodspeed and Sergey Bratus took the show. Great informational and entertaining presentation! I encourage anyone to check out the hardware Travis has developed and his papers if you are [...]

2017-03-12T17:39:48-07:00 June 18th, 2012|Security Tools, Security Vulnerabilities|0 Comments

Week 23 in Review – 2012

Resources Efficient Padding Oracle Attacks on Cryptographic Hardware - hal.inria.fr Stealing RSA private keys from hardware using oracle attacks in a few hours. JSLR - thespanner.co.uk Cross-Site Scripting (XSS) has been around for ages – with first incidents being reported in the late nineties. Despite the attack technique not being the most complex of all, [...]

2017-03-12T17:39:48-07:00 June 10th, 2012|Security Tools, Security Vulnerabilities|0 Comments

Week 22 in Review – 2012

Event Related HITB Security Conference 2012 Amsterdam - Materials - conference.hitb.org The Materials of HITB Security Conference 2012 – Amsterdam has been published. Resources iOS iPhone Forensics Analysis of iOS 5 backups : Part 2 - resources.infosecinstitute.com In the first part of this article, we discussed the techniques to read iTunes backups. The following article [...]

Week 21 in Review – 2012

Event Related HITB2012 Amsterdam Day 1 HITB2012AMS Day 1 – One Flew Over The Cuckoos Nest - corelan.be Claudio Guarnieri, senior researcher at iSight Partner, and part of the Shadowserver Foundation and the HoneyPot project. He works with malware on a daily basis, maintains malwr.com and is the main developer of the Cuckoo Sandbox, which [...]