hackers

/Tag:hackers

Week 14 In Review – 2017

Events Related Cyphercon 2.0 Videos - www.irongeek.com These are the videos from the Cyphercon 2.0 conference. DakotaCon - www.youtube.com South Dakota’s premier security event. TROOPERScon - www.youtube.com AIDE 2017 - www.irongeek.com Resources BlackHat 2017 - blackhat.com Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 1) - googleprojectzero.blogspot.com It’s a well understood fact that platform security is an [...]

Week 43 In Review – 2016

Events Related Hack.lu I’m back to Luxembourg for a new edition of hack.lu. In fact, I arrived yesterday afternoon to attend the MISP summit. It was a good opportunity to meet MISP users and to get fresh news about the project. Hack.lu 2016 Wrap-Up Day #1 - blog.rootshell.be Hack.lu 2016 Wrap-Up Day #2 - blog.rootshell.be Hack.lu 2016 [...]

Week 33 In Review – 2016

Events Related DefCon Event Council of 9 ventured forth to DEFCON 24 to compete in this year’s badge challenge, brought to us each year by 1o57. There was determination among the team to win at DC24 to ensure that last year’s win was not a fluke. After many sleepless nights in Vegas, we emerged victorious for [...]

Week 1 In Review – 2016

Events Related ICIT Brief: Who’s Behind the Wheel? Exposing the Vulnerabilities and Risks of High Tech Vehicles - icitech.org The brief provides a detailed breakdown of the July 2015 Jeep Cherokee hacking demonstration and an analysis of how hackers would behave during a ‘real-world’ attack Rapid Radio Reversing, ToorCon 2015 - greatscottgadgets.com In this video [...]

2017-03-12T17:39:18-07:00 January 3rd, 2016|Security Conferences, Site News, Week in Review|0 Comments

Week 45 In Review – 2015

Resources SecTor 2015 - sector.ca Presentations and videos for SecTor 2015 RuxCon - ruxcon.org.au Tools NMAP - github.com NMAP scripts for TN3270 interaction as well as NJE. Most notably TSO User Enumeration and Brute Force. CICS transaction ID enumeration and NJE node name brute forcing. Techniques Hidden In Plain Sight: Brute Forcing Slack Private Files - [...]

Week 32 In Review – 2015

Events Related Black Hat USA 2015 From The Black Hat Keynote Stage: Jennifer Granick - www.darkreading.com Recap of Black Hat 2015, Day 1 - www.webroot.com DEF CON 23 (2015) DEFCON Talk Slides - colinoflynn.com DEF CON 23 presentations/Speaker & Workshop Materials - media.defcon.org Resources Certifi-gate: Hundreds of Millions of Android Devices Could Be Pwned - [...]

Week 45 In Review – 2014

Resources Secure messaging scorecard – eff.org Many companies offer “secure messaging” products—but are these systems actually secure? EFF decided to find out, in the first phase of a new EFF Campaign for Secure & Usable Crypto. Google Study: Email Users 36 Times More Likely To Get Scammed If Friends’ Accounts Get Hacked – consumerist.com So you think [...]