Security Vulnerabilities

/Security Vulnerabilities

Week 9 In Review – 2015

Resources BSides Tampa 2015 Videos – irongeek.com These are the videos from the BSides Tampa conference. You can watch and download the videos from here. Gemalto presents the findings of its investigations into the alleged hacking of SIM card encryption keys by Britain's Government Communications Headquarters (GCHQ) and the U.S. National Security Agency (NSA) – gemalto.com The [...]

Week 8 In Review – 2015

Resources Equation Group: The Crown Creator of Cyber-Espionage – kaspersky.com Kaspersky Lab’s experts can confirm they have discovered a threat actor that surpasses anything known in terms of complexity and sophistication of techniques, and that has been active for almost two decades – The Equation Group. Russian researchers expose breakthrough U.S. spying program – reuters.com The U.S. [...]

Week 7 In Review – 2015

Resources Today I Am Releasing Ten Million Passwords – xato.net A carefully-selected set of data provides great insight into user behavior and is valuable for furthering password security. So Mark Burnett built a data set of ten million usernames and passwords that he is releasing to the public domain. BSides Huntsville 2015 Videos – irongeek.com These are [...]

Week 6 In Review – 2015

Resources OWASP Proactive Controls – owasp.org This document was written by developers for developers, to assist those new to secure development. It aims to guide developers and other software development professionals down the path of secure web application software development. Anthem-From the Desk of CEO To Members – anthemfacts.com Anthem was the target of a very sophisticated [...]

Week 5 In Review – 2015

Resources Army cyber defenders open source code in new GitHub project – army.mil Army cyber defenders released code to help detect and understand cyber attacks. The forensic analysis code called Dshell has been used, for nearly five years, as a framework to help the U.S. Army understand the events of compromises of Department of Defense networks. [...]

Week 4 In Review – 2015

Events Related Our Favorite Presentations from ShmooCon 2015 – researchcenter.paloaltonetworks.com Jen and Phil were fortunate to attend this year’s ShmooCon, an annual hacker conference held in Washington, DC. Here are the wrap up of the conference. Resources BSides Columbus 2015 Videos – irongeek.com hese are the videos from the BSides Columbus Ohio conference. You can watch and [...]

Week 3 In Review – 2015

Events Related Hou.Sec.Con 5.0 Experience (by an 8 year old) – prudentgames.com A 8 year old kid, Reuben Paul, share his feeling about Hou.Sec.Con 5.0 Experience! It was about qualities that kids and hackers share which makes kids really good hackers. For example kids are creative, kids are curious, kids are credible and kids are cool [...]

Week 2 In Review – 2015

Resources Win32 Assembly Cheat Sheet – strchr.com The idea is to put all reference information about x86 assembly language on the one page. You will find various kinds of moves (MOV, CMOV, XCHG), arithmetical (ADD, SUB, MUL, DIV) and logical (AND, OR, XOR, NOT) instructions here. The International Conference on PASSWORDS 2014. – video.adm.ntnu.no The International Conference [...]

Week 1 In Review – 2015

Resources Index of /projects/media.ccc.de/congress/2014/h264-hd/ – mirror.us.oneandone.net Index of 31c3 congress videos are available here. You can watch and download the videos from here. 31C3: a new dawn - media.ccc.de You can browse and watch all the videos of 31c3 congress from here. World's Biggest Data Breaches – informationisbeautiful.net interactive ‘Balloon Race’ code of World's Biggest Data Breaches powered [...]

Week 52 In Review – 2014

Resources Cyberspectrum: Bay Area Software Defined Radio #2 (Dec 2014) HD – youtube.com first Cyberspectrum meetup in San Francisco. The Bay Area SDR Meetup served as a forum to exchange knowledge and ideas related to Software Defined Radio. Meetup presentations recorded and posted online. The World's Biggest Data Breaches, In One Incredible Infographic – businessinsider.com The folks [...]