Week 1 In Review – 2016

Events Related ICIT Brief: Who’s Behind the Wheel? Exposing the Vulnerabilities and Risks of High Tech Vehicles - The brief provides a detailed breakdown of the July 2015 Jeep Cherokee hacking demonstration and an analysis of how hackers would behave during a ‘real-world’ attack Rapid Radio Reversing, ToorCon 2015 - In this video [...]

2017-03-12T17:39:18-07:00 January 3rd, 2016|Security Conferences, Site News, Week in Review|0 Comments

Week 28 in Review – 2013

Event Related ToorCon Seattle 2013 - Weaponizing your coffee pot - As SoC price continue to drop and their implementation continues to rise, connected “appliances" (Internet of Things) will be become an attractive avenue for cyber criminals. Due to the fact they provide no traditional feedback (monitor) or input (mouse/keyboard), If one were able to compromise [...]

Week 44 in Review – 2012

Event Related Hashdays Hashdays Wrap-up Day #1 - I’m in Luzern for a few days but the Hashdays security conference started today! w00t! This is the first edition for me. A very nice opening session performed by the defcon-switzerland group which organises this event. Hashdays Wrap-Up Day #2 - Yesterday evening, I went [...]

Week 43 in Review – 2012

Event Related ToorCon ToorChat - A Chat Program for use with the ToorCon 2013 badge. ToorCon Presentation - Thanks for attending my Toorcon Presentation. Below are links to my presentation and the references I mentioned in the talk. Please let me know if you have any recommendations on course materials. ToorCon Presentation - [...]

Week 41 In Review

Events Related RSA Europe Conference Wrap-up - This is my wrap-up of the last RSA Conference which occurred in London. As usual, it’s a mix of t-shirts and ties. But, vendors followed the rules of the game and came with less promotional material for their next-top-ultra-last-generation-solution-to-beat-all-hackers-from-outer-space. Resources Hack In The Box Security Conference Presentation Materials [...]

Week 43 in Review – 2010

Events Related: ToorCon related news Some Results from the ToorCon Security Conference - Hackers, security researchers at the ToorCon security conference in San Diego showed how easy it can be to poke holes in hardware and software with the right combination of tools, know-how, and good old fashioned cat curiosity. ToorCon: New Apps, Old [...]

Information Security Events for October

. Here are the information security events in North America this month: 20th Virus Bulletin International Conference: September 29 - October 1 in Vancouver Workshop on Managing Systems via Log Analysis and Machine Learning Techniques: October 3 in Vancouver Hacker Halted: October 9 - 15 in Miami BlueHat v10: A Security Odyssey: October 14 -15 [...]

Tools From ToorCon X

I promised this list to Rob (mubix) Fuller a while ago, and I finally got around to compiling it. So here is the list of tools that were talked about at ToorCon X, organized by presentation. Targeted VoIP Eavesdropping: An Attack From Within VoIP Hopper X Test UC Sniffer ACE – Automated Corporate Enumerator One [...]

2017-03-12T17:40:21-07:00 December 2nd, 2008|Security Conferences, Security Tools|1 Comment

ToorCon X Presentations

The presentations from ToorCon X are now available to download on the ToorCon X Conference page. Below are direct links to the presentations. Hour Presentations Black Ops of DNS 2008: Its The End Of The Cache As We Know It by Dan Kaminsky How To Impress Girls With Browser Memory Protection Bypasses by Alexander Sotirov [...]

2008-10-24T20:57:00-07:00 October 24th, 2008|Security Conferences|1 Comment