Adobe Flash Player

/Tag:Adobe Flash Player

Week 11 In Review – 2015

Resources A Primer on IoT Security Research – In this blog post Mstanislav'd like to give a high-level sense of what IoT security research often entails. TThis post is intended for the casual security researcher, or even IoT vendor, who wants to know what this research looks like, and where to get started. ElasticSearch CVE-2015-1427 [...]

Week 5 In Review – 2015

Resources Army cyber defenders open source code in new GitHub project – Army cyber defenders released code to help detect and understand cyber attacks. The forensic analysis code called Dshell has been used, for nearly five years, as a framework to help the U.S. Army understand the events of compromises of Department of Defense networks. [...]

Week 4 In Review – 2015

Events Related Our Favorite Presentations from ShmooCon 2015 – Jen and Phil were fortunate to attend this year’s ShmooCon, an annual hacker conference held in Washington, DC. Here are the wrap up of the conference. Resources BSides Columbus 2015 Videos – hese are the videos from the BSides Columbus Ohio conference. You can watch and [...]

Week 50 In Review – 2014

Resources Free eBook Download, Getting Started with OpenBTS – The new OpenBTS book is being made available for free! Fill in your name and e-mail address and they'll send you a DRM-free PDF of the book. Nosuchcon 2014-Live stream – Here are a List of HLS streams available. Open with VLC, mplayer, a browser on [...]

Week 46 In Review – 2014

Events Related Amazon Fire Phone, iPhone, Nexus 5, Samsung S5 All Popped At Mobile Pwn2Own – A slew of the world’s most popular smartphones have been prized open at the Mobile Pwn2Own hacking contest in Tokyo, Japan this week. Hosted by the HP Zero Day Initiative, the competition offered up big cash prizes for those [...]

Week 37 In Review – 2014

Events Related ArchC0n ’14 Report – Dale Peterson spoke at the inaugural ArchC0n in St. Louis this Saturday. The main reason he chose to go to this IT security event was they had Richard Bejtlich, Bruce Schneier and Charlie Miller as keynotes. Quite a haul for the first run. Here are some of the items [...]

Week 24 In Review – 2014

Resources CySCA2014-in-a-Box – CySCA2014-in-a-Box is a Virtual Machine that contains most of the challenges faced by players during CySCA2014. It allows players to complete challenges in their own time, to learn and develop their cyber security skills. From a Username to Full Account Takeover – Usernames, email addresses and phone numbers are invaluable pieces of [...]

Week 11 In Review – 2014

Events Related Pwn2Own 2014: A recap – Two record-setting days of payouts for zero-day vulnerabilities brought the 2014 Pwn2Own contest tantalizingly close to the first million-dollar competition, with $850,000 paid to eight entrants. $385,000 of potential prize money remained unclaimed. Researchers pocket record $400K at Pwn2Own hacking contest's first day – Researchers on Wednesday cracked [...]

Week 8 In Review – 2014

Events Related Course Review: Offensive Security AWE (Advanced Windows Exploitation) – In terms of training, Offensive Security is best known for their Pentesting with BackTrack/Kali (PWK) and Cracking the Perimeter (CTP) courses. The course was delivered by its creators, Matteo Memelli and Devon Kearns. Matteo handled all of the speaking responsibilities, and Devon apparently participated [...]

Week 50 in Review – 2012

Event Related Legal Merits of 'Hack Back' Strategy - From point-of-sale hacks to malware and DDoS attacks, the top cyberthreats of 2012 have been aggressive and strong. Is it time for organizations to adopt a "hack back" strategy against perceived attackers? Resources Mitigating Targeted Attacks on Your Organization - The Trustworthy Computing blog [...]