Week in Review

/Week in Review

Week 16 In Review – 2015

Events Related Test your hacker skills with DEF CON at the 2015 TRIBECA film festival – tribecafilm.com For the first time ever, the world's biggest underground hacking conference will travel from Las Vegas to NYC for this year's TFF. Resources PCI versions 3.0, 3.1 and your SecureSphere deployment – blog.imperva.com This blog entry will focus solely on [...]

Week 15 In Review – 2015

Resources SyScan2015 Conference Slides – syscan.org These are the SyScan2015 Conference Slides. SyScan2015 Conference Slides can be download from here. CanSecWest 2015 Files – cansecwest.com The CanSecWest conference was established in 2000. Archives of presented materials in CanSecWest Vancouver 2015 can be found here. RF Testing Methodology – nccgroup.github.io The RFTM is an Open Source, collaborative testing methodology.It [...]

Week 13 In Review – 2015

Events Related Pwn2Own 2015: Day One results – h30499.www3.hp.com The first day of Pwn2Own 2015 saw successful attempts by four entrants against four products, with payouts of $317,500 to researchers during today’s competition. Pwn2Own 2015: Day Two results – h30499.www3.hp.com The second and final day of Pwn2Own 2015 saw successful exploits by both entrants against four products, [...]

Week 12 In Review – 2015

Events Related Troopers15 Wrap-Up Day #1 – blog.rootshell.be This is Xavier's first Troopers conference. Here is the wrap-up for the first day of Troopers15. Before the review of the talks, a few words about the conference. The venue was really nice as well as the facilities. Troopers15 Wrap-Up Day #2 – blog.rootshell.be This is Xavier's wrap-up for [...]

Week 11 In Review – 2015

Resources A Primer on IoT Security Research – community.rapid7.com In this blog post Mstanislav'd like to give a high-level sense of what IoT security research often entails. TThis post is intended for the casual security researcher, or even IoT vendor, who wants to know what this research looks like, and where to get started. ElasticSearch CVE-2015-1427 [...]

Week 10 In Review – 2015

Resources A Visual Introduction to DSP for SDR – visual-dsp.switchb.org This is an animated slide deck providing a tour of digital signal processing topics relevant to implementation of software-defined radios, focusing on building visual/geometric intuition for signals. Anatomy of A Hack – theverge.com Partap Davis online life had been compromised. Read the full story here. A step-by-step [...]

Week 9 In Review – 2015

Resources BSides Tampa 2015 Videos – irongeek.com These are the videos from the BSides Tampa conference. You can watch and download the videos from here. Gemalto presents the findings of its investigations into the alleged hacking of SIM card encryption keys by Britain's Government Communications Headquarters (GCHQ) and the U.S. National Security Agency (NSA) – gemalto.com The [...]

Week 8 In Review – 2015

Resources Equation Group: The Crown Creator of Cyber-Espionage – kaspersky.com Kaspersky Lab’s experts can confirm they have discovered a threat actor that surpasses anything known in terms of complexity and sophistication of techniques, and that has been active for almost two decades – The Equation Group. Russian researchers expose breakthrough U.S. spying program – reuters.com The U.S. [...]

Week 7 In Review – 2015

Resources Today I Am Releasing Ten Million Passwords – xato.net A carefully-selected set of data provides great insight into user behavior and is valuable for furthering password security. So Mark Burnett built a data set of ten million usernames and passwords that he is releasing to the public domain. BSides Huntsville 2015 Videos – irongeek.com These are [...]