Blog Posts Tagged with "DEFCON"

D2ce0c8b91e51a6bbda34c4bdc43ee54

The Evolution of Things: The Next Phase of Security

August 14, 2013 Added by:Ramece Cave

Within the past two years, a program called r00tz, formerly DEFCON Kids, was started, aimed at teaching children ages eight to sixteen white hat security practices. The encounter in the hall got me thinking that maybe the kids who are learning security today will not make the same mistakes that we see in our industry daily.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Defcon 21: Things You May Have Missed

August 08, 2013 Added by:Tripwire Inc

This is the time of year to reflect on the revelations brought forth from Black Hat and Defcon. For those of you who were unable to attend, I have highlighted some Defcon revelations which you may not have heard about.

Comments  (0)

D03c28fd5a80c394905c980ee1ecdc88

Government Hackers: Party in the NSA

August 02, 2012 Added by:Bill Mathews

General Alexander says that private sector, hackers, exploit developers, etc. need to share information and tools in order to help protect the US. Is the NSA being nefarious and wanting to spy on hackers, or are they legitimately seeking help for a problem that will only continue to grow in the future?

Comments  (0)

7c5c876d1933023ac375eead04302e1a

Un-Ninja the NinjaTel Phone

August 01, 2012 Added by:Boris Sverdlik

For the lucky few that did get the phone, you will be happy to know that the phone has been rooted, but the bootloader is locked. In order to get to any of the settings all that was required was pulling up the IDE app in an area where the phone couldn't connect to any of the pre-installed wireless access points...

Comments  (5)

7fef78c47060974e0b8392e305f0daf0

Psychopathy Tweets: Too Many Statistics, Not Enough Proof of Concept

August 01, 2012 Added by:Infosec Island Admin

What I came out with, after many slides of numbers, was “nope not really”, which I pretty much had thought before. There are just too many variables to this type of venture and you would need to have a trained psychoanalyst to talk to the individual to determine whether or not they are a true psychopath...

Comments  (1)

7c5c876d1933023ac375eead04302e1a

Blackhat, BSidesLV and DefCon Oh My... 2012 Edition

August 01, 2012 Added by:Boris Sverdlik

The upside for being in Vegas for BlackHat is that BSidesLV runs concurrently. BSides always tend to be much better events. The attendees are rarely the vendor mouthpiece types and this alone makes the conference enjoyable. I had attended more talks at BSides than I have at other conferences combined this year....

Comments  (0)

4bc4991ebc3bd722765f157c77924e7a

Rebooting Infosec Cons

July 31, 2012 Added by:Dan Klinedinst

I just got home from the "Vegas week" of Black Hat, BSidesLV, and DefCon. I love many things about each, and each has things I wish they'd do better. This is true of all the conferences I've attended. However, a few questions are lingering in my mind after Vegas, possibly due to the effects of sleep deprivation...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Don’t Freak Out, It was Only DefCon

July 31, 2012 Added by:Brent Huston

Disregard tales of drunken hackers menacing Vegas hotels, changing signs and doing social engineering attacks. They are good for amusement and awareness, but they are NOT really useful as a lens for viewing your organization’s risk or the steps you should be taking to protect your data. Instead, stick to the basics...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Defcon Grows Up and Gets Recruited as an Asset

July 31, 2012 Added by:Infosec Island Admin

With the advent of Anonymous and Stuxnet and the nascent idea of the internet becoming a “digital nation state” we all have to be mindful that while the technologies out there are a commodity, so too are we in the great game of cold war intelligence and cyber war. We are the commodity that makes the new exploit...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Detecting Psychopathy via Tweets? A Flawed Premise...

July 25, 2012 Added by:Infosec Island Admin

It seems to me that more and more we are being collectively mined not only for our habits, but now our emotions as well as our psychological makeups. All of this could potentially be collated from numerous sources. I doubt we will ever be able to contextualize the human psyche just from internet datum…

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Infosec Island Seeks Industry Partners for Security Conferences

May 07, 2012 Added by:Infosec Island Admin

Through a combination of custom content publication that features products and services, video interviews with company personnel onsite, and traditional banner ad campaigns, organizations can better leverage the impact of attendance and participation at key industry events...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Fear and Loathing in Infosec: The Black Mass

May 02, 2012 Added by:Infosec Island Admin

Gesticulating and making odd sounds, the hackers milled and jerked around like some strange species of black raptors. Babbling incoherently about arcane knowledge in the hopes of one upping the other hapless technoweens in the room....

Comments  (0)

37d5f81e2277051bc17116221040d51c

Hackers Hacked Away in Las Vegas

September 07, 2011 Added by:Robert Siciliano

What most people don’t realize is not all hackers are bad. Certainly “crackers and cyber criminals” are bad, but many hackers are full time security professionals and work around the clock to create the security software to protect us...

Comments  (0)

B09c361cbdc6cf629affdc7db30a186d

Security Awareness Education Begins with the Youth

August 29, 2011 Added by:Steven Fox, CISSP, QSA

DefCon Kids follows the trend towards developing cybersecurity skills in youth, so that these young professionals will one day be prepared to tackle the increasingly advanced cyber attacks that constantly threaten today’s enterprises...

Comments  (0)

4e21f96122846f32545687ad42b271e2

Agnitio v2.0 and Mobile Apps

August 17, 2011 Added by:Security Ninja

Regardless of the resource exposure based on the arguments to the creation function, malicious applications or malicious users that have root access to the device will be able to read or write to anything on the device. Truly sensitive data should never be stored on the device itself...

Comments  (0)

A8054e07abdfdcadb09322585cb2e085

BSidesLV and DEFCON 2011 Summary

August 11, 2011 Added by:Michael SecurityMoey

If you have never been to DEFCON there is no way to describe it that would do it justice. DEFCON is draws hackers, crackers, and Feds. The old staples were there such as the lock picking, hardware hacking, Wall of Sheep, sky talks, Mohawk con, etc. This year also had many firsts...

Comments  (2)

Page « < 1 - 2 > »