Week 25 In Review – 2014

Resources Circle City Con 2014 Videos – These are the Circle City Con 2014 videos. You can watch and download all of the recordings from here. OWASP Security Shepherd – Security Shepherd has been implemented with the aim of fostering and improving security awareness among a varied skill-set demographic. This project enables users to learn [...]

Week 23 In Review – 2014

Resources CRITs-Collaborative Research Into Threats – Upload threat data and uncover critical information to keep your organization safe. Develop additional capabilities using the Services Framework to combine CRITs with third-party and home-grown intelligence systems. Heartbleed, Cupid and Wireless – Since Luis Grangeia presentation on cupid had gotten quite a bit of attention, he felt it’s [...]

Week 15 In Review – 2014

Events Related Enter to win an INFILTRATE security conference ticket worth $2,2000 from Hacker Warehouse – INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. Groundbreaking researchers focused on the latest technical issues will demonstrate techniques that you cannot find elsewhere. Conference is being held on May 15 and 16 in [...]

Week 5 In Review – 2014

Resources BLE Fun With Ubertooth: Sniffing Bluetooth Smart and Cracking Its Crypto – Ubertooth is an open source platform for Bluetooth research. It has a powerful ARM microcontroller connected to a reconfigurable radio chip, the TI CC2400. Although it was originally built to monitor classic Basic Rate (BR) Bluetooth, it serves as an excellent platform [...]

Week 50 In Review – 2013

Events Related Baythreat 4 – Baythreat Day Two. Here are the writeups of another series of excellent presentations from the breaker track for the remainder of the day. The AppSec Program Maturity Curve 4 of 4 – This is the final post in a series on the Application Program Maturity Curve. In this series, Veracode [...]

Week 46 In Review – 2013

Tools WCE v1.42beta released (32bit) – WCE v1.42beta released (32bit). This is a minor release. Download it from here. heapLib 2.0 – Chris Valasek released the code for heapLib2. For those of you not familiar, he introduced methods to perform predictable and controllable allocations/deallocations of strings in IE9-IE11 using JavaScript and the DOM. Techniques Unpacking [...]

Week 35 In Review – 2013

Resources Want to break some Android apps? – @jhaddix, the newest blogger shared a bunch of Android apps hacking tools links. Tools Linux Exploit Suggester – This is a Linux Exploit Suggester, with no frills and no fancy features; just a simple script to keep track of vulnerabilities and suggest possible exploits to use to [...]

Week 28 in Review – 2013

Event Related ToorCon Seattle 2013 - Weaponizing your coffee pot - As SoC price continue to drop and their implementation continues to rise, connected “appliances" (Internet of Things) will be become an attractive avenue for cyber criminals. Due to the fact they provide no traditional feedback (monitor) or input (mouse/keyboard), If one were able to compromise [...]

Week 27 in Review – 2013

Event Related Hack in Paris 2013 edition Video and Slides available now on each talk briefing! BYOD - The Privacy and Compliance Risks from Bringing Your Own Mobile Device to Work - Remoting Android Applications for Fun and Profit - The Control of Technology by Nation State : Past, Present and Future - The Case of Cryptology and [...]

Week 24 in Review – 2013

Event Related Workshop on the Economics of Information Security 2013 - I’m liveblogging WEIS 2013, as I did in 2012, 2011, 2010 and 2009. This is the twelfth workshop on the economics of information security, and the sessions are being held today and tomorrow at Georgetown University. Stupid Little IPv6 Tricks - With [...]