Blog

/Blog/

Week 12 in Review – 2012

Event Related CanSecWest 2012 Hardware Involved Software Attack - forristal.com Material for CanSecWest 2012 by Jeff ForristralVulnerability analysis, practical data flow analysis and visualization - blogs.technet.com Recently at CanSecWest 2012, we presented on the technology we use for analyzing malicious samples and PoC files. As malware often actively attempts to exploit software vulnerabilities these days, [...]

Week 11 in Review – 2012

Event Related Black Hat Europe 2012 Summaries, Updates and Tools BlackHat Europe 2012 Day #1 Wrap-Up - blog.rootshell.be BlackHat is back in Europe and, this year, they moved back to Amsterdam! This edition also introduced a new format: A three-days conference with three simultaneous tracks. BlackHat Europe 2012 Day #2 Wrap-Up - rootshell.be And I’m [...]

Week 10 in Review – 2012

Event Related CanSecWest CanSecWest evolving - blog.securiteam.com Let me say, right off the top, that I love CanSecWest. I am tired of “vendor” conferences, where you pay outrageous fees for the privilege of sitting through a bunch of sales pitches. At least CanSecWest has real information, as opposed to virtual information. CanSecWest Day 1 Pen [...]

Week 9 in Review – 2012

Event Related RSA Conference 2012 RSA Conference 2012: Stress and burnout in infosec careers- csoonline.com IT security professionals are experiencing extreme levels of stress and burnout, but they have few places to turn for help. RSA Conference Photos- tripwire.com Here are our photos from the RSA Conference 2012. Each day of the show, we asked [...]

Week 8 in Review – 2012

Resources A look at ASLR in Android Ice Cream Sandwich 4.0 - blog.duosecurity.com For the uninitiated, ASLR randomizes where various areas of memory (eg. stack, heap, libs, etc) are mapped in the address space of a process. The Ultimate OS X Hardening Guide Collection - isc.sans.edu Many security professionals tend to use OS X systems. [...]

2017-03-12T17:39:50-07:00 February 27th, 2012|Security Tools, Security Vulnerabilities, Uncategorized|0 Comments

Week 7 in Review – 2012

Event Related OWASP AppSec USA 2011 Schedule/Slides/Video - appsecusa.org Schedule, slides, and video for OWASP AppSec USA 2011 - September 20-23 ShmooCon 2012 - January 27-29 - Presentations - shmoocon.org ShmooCon 2012 Presentations and Videos available here. FOSDEM 2012 - First video recordings uploaded! - fosdem.org We are pleased to announce that the first video [...]

Week 6 in Review – 2012

Event Related ShmooCon Firetalks 2012 ShmooCon Firetalks 2012 - irongeek.com These are the videos I have for the ShmooCon Firetalks 2012. ShmooCon Epilogue 2012 - irongeek.com These are the videos I have for ShmooCon Epilogue 2012. Georgia recorded the live parts, and my rig was used for the slides. Sorry that there are some missing [...]

Week 5 in Review – 2012

Event Related ShmooCon 2012 Updates, Videos, Slides and Presentation Five Ways We’re Killing Our Own Privacy - scribd.com/doc Slides from ShmooCon and Firetalks Presentation Attacking Prox Card Systems - opensecurityresearch.com Slides and Code from Brad Antoniewicz's awesome talk on Attacking Prox Card Systems Shmoocon 2012 - tombom.co.uk In the absence of an “official” download link [...]

Information Security Events For February

Here are information security events in North America this month:   NDSS Symposium 2012 : February 5 to 8 in San Diego, California USA   ACM Conference on Data and Application Security and Privacy (CODASPY) : February 8  to 12 in San Antonio, TX USA   DOJ Cyber Security Conference : February 8 to 9 in Washington, D.C. [...]

2017-03-12T17:39:51-07:00 February 3rd, 2012|Local Meetings, Security Conferences, Security Training|0 Comments