Vendor News

/Vendor News

Week 43 In Review – 2015

Events Related HouSecCon v6 2015 Videos - 2015 Today started the 11th edition of in Luxembourg. Being one of my preferred event, I drove to Luxembourg this morning direction to the Alvisse Parc hotel! 2015 Wrap-Up Day #1 - 2015 Wrap-Up Day #2 - 2015 Wrap-Up Day #3 [...]

Week 42 In Review – 2015

Events Related Videos and Slide Decks from the re:Invent 2015 Security and Compliance Track - Whether you want to review a Security and Compliance track session you attended at re:Invent 2015, or you want to experience a session for the first time, videos and slide decks from the Security and Compliance track are now [...]

Week 39 In Review – 2015

Events Related The CIA Campaign to Steal Apple’s Secrets - The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. Resources Reversing Mobile Traffic Lights - I wanted to have a look at [...]

Week 37 In Review – 2015

Events Related 44CON - BSides Augusta 2015 Videos - Videos from the BSides Augusta conference. Resources Satellite Turla: APT Command and Control in the Sky - When you are an APT group, you need to deal with many different problems. One of them, and perhaps the biggest, is the constant seizure and takedown of [...]

Week 34 In Review – 2015

Events Related DEFCON This year marked the 23rd DefCon, the hacker conference that began as an informal gathering for hackers to meet in person and party in the desert. Imploding Barrels and Other Highlights From Hackfest DefCon - I spent the week with over 20,000 hackers in Las Vegas — here's what I saw [...]

Week 33 In Review – 2015

Events Related Kaminsky Creates Clickjacking-Killer - Renowned security expert Dan Kaminsky here this week unveiled his latest project: a solution to eradicate so-called clickjacking attacks that plague the Web. 9th USENIX Workshop on Offensive Technologies - Black Hat USA 2015 Highlights - The 18th annual Black Hat USA conference gathered thousands of professionals, [...]

Week 30 In Review – 2015

Resources Jailbreak or Root Detection: A False Sense of Security, Part 1 - Mobile management vendors have ingrained in the industry that jailbroken and rooted devices are bad: automatically deny all access. There is a widespread fear in the industry that these “compromised” devices jeopardize enterprise networks and are prone to leaking corporate secrets. [...]

Week 28 In Review – 2015

Events Related The MiTM Mobile Contest: GSM Network Down at PHDays V - The MiTM Mobile contest was held at PHDays for the first time, and it let the participants realize how easily an attacker can conduct the above-mentioned attacks having only a 10$ cell phone with some hacker freeware. SHAKACON SHAKACON was a [...]

Week 26 In Review – 2015

Resources The $300 'PITA' steals encryption keys with radio waves - Your computer is leaking information. It's not from the usual suspects: WiFi, Bluetooth or ethernet, but from radio waves originating from your processor. Researchers at Tel Aviv University and Israel's Technion research institute have built a $300 device that captures those electromagnetic waves [...]

Week 25 In Review – 2015

Resources Circle City Con 2015 Videos – These are the Circle City Con videos. You can watch and download the videos from here. LastPass Security Notice – LastPass want to assure their users that their cyberattack response worked as designed. They have received many questions so they want to take a moment and provide additional [...]