microsoft security updates

/Tag:microsoft security updates

Week 46 In Review – 2014

Events Related Amazon Fire Phone, iPhone, Nexus 5, Samsung S5 All Popped At Mobile Pwn2Own – A slew of the world’s most popular smartphones have been prized open at the Mobile Pwn2Own hacking contest in Tokyo, Japan this week. Hosted by the HP Zero Day Initiative, the competition offered up big cash prizes for those [...]

Week 33 In Review – 2014

Events Related Def Con 22 DEFCON 22: The Con That Keeps on Giving – Luna Lindsey is redefining the conference experience. She had an amazing time this year, as always. But as a neophile, she crave new experiences. Def Con: the ‘Olympics of hacking’ – Welcome to Def Con, the Olympics of hacking, where for [...]

Week 28 In Review – 2014

Resources Vendor Checklist app / Trust Metric app – ISECOM (the Institute for Security and Open Methodologies) began with the release of the OSSTMM, the Open Source Security Testing Methodology Manual. It was a move to improve how security was tested and implemented. Dumping Data from Memcached Servers – Memcached servers provide a dynamic, distributed [...]

Week 11 In Review – 2014

Events Related Pwn2Own 2014: A recap – Two record-setting days of payouts for zero-day vulnerabilities brought the 2014 Pwn2Own contest tantalizingly close to the first million-dollar competition, with $850,000 paid to eight entrants. $385,000 of potential prize money remained unclaimed. Researchers pocket record $400K at Pwn2Own hacking contest's first day – Researchers on Wednesday cracked [...]

Week 8 In Review – 2014

Events Related Course Review: Offensive Security AWE (Advanced Windows Exploitation) – In terms of training, Offensive Security is best known for their Pentesting with BackTrack/Kali (PWK) and Cracking the Perimeter (CTP) courses. The course was delivered by its creators, Matteo Memelli and Devon Kearns. Matteo handled all of the speaking responsibilities, and Devon apparently participated [...]

Week 50 In Review – 2013

Events Related Baythreat 4 – Baythreat Day Two. Here are the writeups of another series of excellent presentations from the breaker track for the remainder of the day. The AppSec Program Maturity Curve 4 of 4 – This is the final post in a series on the Application Program Maturity Curve. In this series, Veracode [...]

Week 7 in Review – 2013

Event Related S4x13 Video: Atlas on RF Comms Security and Insecurity - RF Comms are often ignored in SCADA assessments. Big mistake as atlas 0f d00m shows RF hacking session at S4x13. #Shmoocon Presentation Links - So I talked fast and furious and ran out of time, but 20 minutes is not a [...]