security.didici.cc

DEF CON 25 - Avi Bashan, Slava Makkaveev - Everything to know about Android packers

9 hours ago

To understand the Android ecosystem today, one must understand Android packers. Whether used for protecting legitimate apps' business logic or hiding malicious content, Android packer usage is on the rise. Android packers continue to increase their effort ...

DEF CON 25 Packet Hacking Village - Catherine Ullman, Chris Roberts - Breaking the Bad News

9 hours ago

Enabling better communications between geeks and management. As humans, we have had 60,000 years to perfect communication, but those of us working in IT, regardless of which side (Blue or Red Team), still struggle with this challenge. We have done our bes ...

DEF CON 25 Packet Hacking Village - Chris Wysopal - How Hackers Changed the Security Industry

9 hours ago

Before hackers got involved in cybersecurity the industry was focused on products and compliance. Security was security features: firewalls, authentication, encryption. Little thought was given to vulnerabilities that allowed the bypassing of those featur ...

DEF CON 25 BioHacking Village - C00p3r, Cur50r - Implantable Technology Show and Tell

9 hours ago

Through sharing experiences learned first hand and through work on the Dangerous Minds Podcast, c00p3r will be introducing you to implantable technology, explaining the basic products that are available on the market now, from where, as well as provide a ...

DEF CON 25 BioHacking Village - Christopher Frenz - Standardizing Deployment Of Medical Devices

9 hours ago

In recent months it seems like not a week passes where you do not encounter a headline that states that a healthcare organization has been held for ransom or in some other way involved in a breach. Healthcare has been a sector that has routinely been desc ...

DEF CON 25 BioHacking Village - Stanislav Naydin, Vlad Gostomelsky - Medical Device Ethics

9 hours ago

We will engage the audience in a discussion of modern technological advances along with their ethical implications. We live in an era where the very implanted hardware that keeps you alive can be evidence in the court of law. Neuroscience is now a tool us ...

DEF CON 25 BioHacking Village - Amanda Plimpton, Evan Anderson - Psychoactive Chemicals in Combat

9 hours ago

By looking at key experiments and trials done by the military we can learn about psychoactive chemicals and protocols that work, and don’t work, on humans. From biological enhancement to chemical deterrents, there is a wealth of information that grassro ...

DEF CON 25 BioHacking Village - Edward You - Biotechnology Needs A Security Patch Badly

9 hours ago

What talk? Its going to be a theatrical song and interpretive dance related to the 5 w's and how to fix our bio economy. You get it, I know you do. For More Information Please Visit:- https://defcon.org/

DEF CON 25 BioHacking Village - Gingerbread - Neurogenic Peptides Smart Drugs 4 Minute Mile

9 hours ago

Everything is impossible until it isn't. Every undertaking, defined by the hard limitations at the edges of our possible achievement. Lossless electrical conductivity, human travel beyond the sound 'barrier', running a four-minute mile...each, seen as s ...

DEF CON 25 BioHacking Village - Jay Radcliffe - The Scientific Method in Security Research

9 hours ago

One of the huge criticisms of Security research is the lack of process and adherence to traditional research methods. Quite often our "research" is just tearing apart systems and exposing their vulnerabilities. While this is useful, there is a better way. ...

The Tool Box | Pupy

9 hours ago

Today's episode of The Tool Box features Pupy. We breakdown everything you need to know! Including what it does, who it was developed by, and the best ways to use it! Check out Pupy here: Github - https://github.com/n1nj4s
ec/pupy Thanks for watching an ...

Circle City Con 2017 - How To Be Curious

9 hours ago

Curiosity. It's not just for killing cats. In fact, it's *the heart* of the hacker mindset. Like many seemingly abstract mental qualities, those on the outside or those at the start of their journey can be left in the cold, wondering if they've ???got it ...

Circle City Con 2017 - Ph'ing Phishers

9 hours ago

Credential phishing is super lame. Sadly it's one of the main workhorses behind financing so much bad stuff that it deserves to be smacked around by a large trout. Over the past year I've written automation to help turn a monumentally mundane task of scra ...

Circle City Con 2017 - The Kids Aren't Alright: Security and K-12 Education in America

9 hours ago

"Stupid users!" is a common lament. But users aren't stupid, they're just following their training. What is the education that users are getting? This talk will cover the training--or lack thereof--that is being given in American schools, the root of the ...

Circle City Con 2017 - Threat Intelligence: Zero to Basics

9 hours ago

This is an audience participation talk, on going from having DFIR with no Threat Intelligence to building a basic threat intelligence program. The majority of the data needed to start a Threat Intelligence program is probably already being captured by the ...

Circle City Con 2017 - Network manipulation on video games.

9 hours ago

I will go over common misnomers of online cheating methods. Explain the realistic side of why Peer to Peer games can be broken. I will showcase a method I PoC 5 years ago, yet I haven't seen this type of manipulation displayed online (video demo). I will ...

Circle City Con 2017 - OSINT And Your World A Love Story Michael James

9 hours ago

Circle City Con 2017 - OSINT And Your World A Love Story Michael James For More information Please Visit:- http://circlecitycon.com/
http://www.irongeek.com/
i.php?page=videos/circlec
itycon2017/mainlist

Circle City Con 2017 - It's A Disaster!

9 hours ago

You don't know what you don't know. There are things we have no control over. Natural disasters, acts of god, kids and spitup. We do, however, have the benefit of history and experience. But as security bears out, we are selective in what we choose to lea ...

Circle City Con 2017 - Detecting DNS Anomalies with Statistics

9 hours ago

Defending against attackers has become increasingly difficult. Solutions using signature based detection such as IPS and anti-virus are still needed, but no longer prevent all malware or virus infections. What can be done to improve the ability to prevent ...

Circle City Con 2017 - Network Security? What About The Data?

9 hours ago

The data is the ultimate prize for threat actors. Bypassing the firewall is not their goal, but is rather a mere necessity. I am going to propose a possible different approach that better addresses data security than the network-centric model that is comm ...

Circle City Con 2017 - Security Training: Making Your Weakest Link The Strongest

9 hours ago

It is a common joke amongst security professionals that the weakest link in any organizations security is the employees- the so-called "human element". The unfortunate part about this joke is that it's entirely accurate. The common approach to solving thi ...

Circle City Con 2017 - Application Security Metrics

9 hours ago

What's your current level of confidence in your application security program? Are you tracking any pen test metrics? Maybe you should. This session will detail several application security metrics used to measure the effectiveness of penetration testing a ...

Day 11 | Daily December Deals

9 hours ago

Check out today's Daily December Deal! http://promo.pente
steracademy.com/decemberd
eals FOLLOW US ON: ~Facebook: http://bit.ly/2uS4pK0 ~Tw
itter: http://bit.ly/2vd5QSE ~In
stagram: http://bit.ly/2v0tnY8 ~Li
nkedIn: http://bit.ly/2ujkyeC ~Go
ogle +: http://bi ...

USENIX Security '17 - Measuring HTTPS Adoption on the Web

9 hours ago

Adrienne Porter Felt, Google; Richard Barnes, Cisco; April King, Mozilla; Chris Palmer, Chris Bentzel, and Parisa Tabriz, Google HTTPS ensures that the Web has a base level of privacy and integrity. Security engineers, researchers, and browser vendors ha ...

USENIX Security '17 - A Longitudinal, End-to-End View of the DNSSEC Ecosystem

9 hours ago

Taejoong Chung, Northeastern University; Roland van Rijswijk-Deij, University of Twente and SURFnet bv; Balakrishnan Chandrasekaran, TU Berlin; David Choffnes, Northeastern University; Dave Levin, University of Maryland; Bruce M. Maggs, Duke University an ...

USENIX Security '17 - ROTE: Rollback Protection for Trusted Execution

9 hours ago

Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, and Arthur Gervais, ETH Zurich; Ari Juels, Cornell Tech; Srdjan Capkun, ETH Zurich Security architectures such as Intel SGX need protection against rollback attacks, where the adv ...

USENIX Security '17 - Adaptive Android Kernel Live Patching

9 hours ago

Yue Chen, Florida State University; Yulong Zhang, Baidu X-Lab; Zhi Wang, Florida State University; Liangzhao Xia, Chenfu Bao, and Tao Wei, Baidu X-Lab Android kernel vulnerabilities pose a serious threat to user security and privacy. They allow attackers ...

USENIX Security '17 - ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service

9 hours ago

Anh Pham, Italo Dacosta, Guillaume Endignoux, and Juan Ramon Troncoso Pastoriza, EPFL; Kevin Huguenin, UNIL; Jean-Pierre Hubaux, EPFL In recent years, ride-hailing services (RHSs) have become increasingly popular, serving millions of users per day. Such ...

USENIX Security '17 - MCMix: Anonymous Messaging via Secure Multiparty Computation

9 hours ago

Nikolaos Alexopoulos, TU Darmstadt; Aggelos Kiayias, University of Edinburgh; Riivo Talviste, Cybernetica AS; Thomas Zacharias, University of Edinburgh We present MCMix, an anonymous messaging system that completely hides communication metadata and can s ...

USENIX Security '17 - The Loopix Anonymity System

9 hours ago

Ania M. Piotrowska and Jamie Hayes, University College London; Tariq Elahi, KU Leuven; Sebastian Meiser and George Danezis, University College London We present Loopix, a low-latency anonymous communication system that provides bi-directional ‘third-pa ...

USENIX Security '17 - See No Evil, Hear No Evil, Feel No Evil

9 hours ago

Christian Bayens, Georgia Institute of Technology; Tuan Le and Luis Garcia, Rutgers University; Raheem Beyah, Georgia Institute of Technology; Mehdi Javanmard and Saman Zonouz, Rutgers University Additive Manufacturing is an increasingly integral part of ...

USENIX Security '17 - Reverse Engineering x86 Processor Microcode

9 hours ago

Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, and Thorsten Holz, Ruhr-University Bochum Microcode is an abstraction layer on top of the physical components of a CPU and present in most general-purpose CPUs ...

USENIX Security '17 - USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs

9 hours ago

Yang Su, Auto-ID Lab, The School of Computer Science, The University of Adelaide; Daniel Genkin, University of Pennsylvania and University of Maryland; Damith Ranasinghe, Auto-ID Lab, The School of Computer Science, The University of Adelaide; Yuval Yarom ...

USENIX Security '17 - Detecting Android Root Exploits by Learning from Root Providers

9 hours ago

Ioannis Gasparis, Zhiyun Qian, Chengyu Song, and Srikanth V. Krishnamurthy, University of California, Riverside Malware that are capable of rooting Android phones are arguably, the most dangerous ones. Unfortunately, detecting the presence of root explo ...

USENIX Security '17 - MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning

9 hours ago

Shiqing Ma, Purdue University; Juan Zhai, Nanjing University; Fei Wang, Purdue University; Kyu Hyung Lee, University of Georgia; Xiangyu Zhang and Dongyan Xu, Purdue University Distinguished Paper Award Winner! Traditional auditing techniques generate la ...

Day 8 | Daily December Deals

5 days ago

Check out today's Daily December Deal! http://promo.pente
steracademy.com/decemberd
eals FOLLOW US ON: ~Facebook: http://bit.ly/2uS4pK0 ~Tw
itter: http://bit.ly/2vd5QSE ~In
stagram: http://bit.ly/2v0tnY8 ~Li
nkedIn: http://bit.ly/2ujkyeC ~Go
ogle +: http://bi ...

GrrCon 2017 - Skills For A Red-Teamer

5 days ago

Want to incorporate hybrid security assessments into your testing methodology? What does going above and beyond look like for these types of assessments? How do you provide the best value with the resources and scope provided? What do some of these toolki ...

GrrCon 2017 - Pen Test War Stories - Why my job is so easy, and how you can make it harder

5 days ago

As a Pen Tester and security professional, I get it. You are faced with a behemoth of a network, constrained by budget, and every day seems to bring a new zero-day to patch. However, there are some basic steps you can take to secure your network without h ...

GrrCon 2017 - An Attack Pathway Into Your Organization? Reducing risk without reducing operational efficiency

5 days ago

Despite the increased understanding in the importance of locking down privileged account access, the fact is that privileged access is not limited to users with a "heartbeat." Enterprise applications, including COTS and custom-built apps often require the ...

GrrCon 2017 - Red Team Yourself

5 days ago

So your organization conducts regular tests with $automated tool. Want to bring your security testing program to the next level? Red Teaming will give your organization a goal based, adversarial emulating approach to see how secure it really is. For More ...

GrrCon 2017 - National Guard for Cyber? How about a Volunteer Cyber Department?

5 days ago

Increased public awareness of "hacking" activities has led to an increase in calls for organized response, some which have better intentions than understanding. The devil is always in the details. For the past 3 years, the State of Michigan has been culti ...

GrrCon 2017 - Embedding Security in Embedded Systems

5 days ago

If security were easy, we,d have solved it 20 years ago. Unfortunately for complex systems, we need all-hands-on-deck: developer training, correct implementation, proper deployment, monitoring, secure updates, and response planning. Come be encouraged by ...

GrrCon 2017 - Topic depends on number of federal agents in audience

5 days ago

GrrCon 2017 - Topic depends on number of federal agents in audience For More Information Please Visit:- http://www.grrcon.com/ ht
tp://www.irongeek.com/i.p
hp?page=videos/grrcon2017
/mainlist

GrrCon 2017 - I've got a (Pocket) Bone to pick with you

5 days ago

This talk will demonstrate several attacks that can be performed using the new open-source PocketBone from the BeagleBoard.org family. The PocketBone is only 1.5�2.5? which means it can fit in a small mint tin and could always be with you. USB and wirel ...

GrrCon 2017 - Eye on the Prize - a Proposal for Legalizing Hacking Back

5 days ago

The myriad objections to legalizing hacking back all agree that an undisciplined horde of skids responding aggressively to every threat presents significant risks we would all like to avoid. Unfortunately the debate has advanced little from this well esta ...

GrrCon 2017 - An Employee, their Laptop and a Hacker walk into a Bar

5 days ago

If one of your company laptops were lost, what might an attacker be able to do with it? In this string of live hacking demos, we begin as an attacker who has no user account credentials and demonstrate how to hack into the warm juicy center of the corpora ...

GrrCon 2017 - Cyber, Cyber, Cyber - Using the killchain to accomplish something

5 days ago

GrrCon 2017 - Cyber, Cyber, Cyber - Using the killchain to accomplish something Amanda Berlin For More Information Please Visit:- http://www.grrcon.com/ ht
tp://www.irongeek.com/i.p
hp?page=videos/grrcon2017
/mainlist

GrrCon 2017 - Realizing Software Security Maturity: The Growing Pains and Gains

5 days ago

Software security maturity is often diluted down to the OWASP Top 10, leaving organizations with a simplistic & ineffective view of risks represented by their real-world attack surface. Where do these organizations then go, to realize a strategy that cons ...

GrrCon 2017 - 10 Cent Beer Night: The World we now Live In

5 days ago

June 4th, 1974: A bench-clearing brawl in response to some extremely "dirty" baseball a week prior at a Texas Rangers game left fans of the visiting Cleveland Indians itching to show how far they,d be willing to go to defend their pride. In the week that ...

GrrCon 2017 - Oops! Was that your pacemaker?

5 days ago

Medical devices have become more prevalent as the population has aged. The earlier applications included the exterior utilized devices. As time passed the technology improved markedly. Technology has improved these devices by, among other modifications, c ...

GrrCon 2017 - Stealing Domain Admin (or How I Learned to Stop Worrying and Love the CSSF

5 days ago

With global information security spending rapidly approaching $100 billion, you,d think we,d have a pretty good handle on preventing data breaches by now. However, considering that nearly 1 billion records have been exposed in the 5000+ data breaches publ ...

GrrCon 2017 - Morphing to Legitimate Behavior Attack Patterns

5 days ago

Let,s face it, the industry is getting better at detection. Not everyone, but it,s getting there. Companies are focusing on getting logs from their endpoints and looking for abnormal patterns of behavior. As attackers, our tactics have been shifting over ...

GrrCon 2017 - 3rd Party Data Burns

5 days ago

3rd Party Data Burns Arron "Finux" Finnon For More Information Please Visit:- http://www.grrcon.com/ ht
tp://www.irongeek.com/i.p
hp?page=videos/grrcon2017
/mainlist

GrrCon 2017 - You Got Your SQL Attacks In My Honeypot

5 days ago

Among the many automated attacks that target the honeypots hosted on my lab network, one of the most interesting in recent memory is also, now, among the most frequent: An automated, Mirai-like attempt to worm malware onto what the attackers clearly think ...

GrrCon 2017 - Population Control Through The Advances In Technology

5 days ago

The Future. :) Will we end up with a hierarchical system of digital existence? At the moment we still need humans to be able to produce for us, we are not talking about food or anything so mundane but at some point we are going to need to maintain a sourc ...

GrrCon 2017 - STRATEGIES ON SECURING YOU BANKS and ENTERPRISES. (FROM SOMEONE WHO ROBS BANKS and ENTERPRISES FOR A LIVING!)

5 days ago

Most people who work on the defensive side of computer security only see the landscape from that perspective! In this talk Jayson will show how an attacker views your website & employees then uses them against you. We,ll start with how a successful spear ...

Day 7 | Daily December Deals

5 days ago

Check out today's Daily December Deal! http://promo.pente
steracademy.com/decemberd
eals FOLLOW US ON: ~Facebook: http://bit.ly/2uS4pK0 ~Tw
itter: http://bit.ly/2vd5QSE ~In
stagram: http://bit.ly/2v0tnY8 ~Li
nkedIn: http://bit.ly/2ujkyeC ~Go
ogle +: http://bi ...

The Tool Box | Koadic

5 days ago

Today's episode of The Tool Box features Koadic. We breakdown everything you need to know! Including what it does, who it was developed by, and the best ways to use it! Check out Koadic here: Github - https://github.com/zerosu
m0x0/koadic Thanks for wat ...

Pentester Academy | Riscure | Brainstorming Session on Attack Examples

5 days ago

Pentester Academy TV took a visit to the Riscure office in San Fransisco to learn more about how they help companies test and secure their products. Check out Riscure here : https://www.riscure.com/a
bout-riscure/ Thanks for watching and don't forget to ...

Pentester Academy | Riscure | Panasayya Yalla

5 days ago

Pentester Academy TV took a visit to the Riscure office in San Fransisco to learn more about how they help companies test and secure their products. Check out Riscure here : https://www.riscure.com/a
bout-riscure/ Thanks for watching and don't forget to ...

Pentester Academy | Riscure | Evan Crockett

5 days ago

Pentester Academy TV took a visit to the Riscure office in San Fransisco to learn more about how they help companies test and secure their products. Check out Riscure here : https://www.riscure.com/a
bout-riscure/ Thanks for watching and don't forget to ...

Pentester Academy | Riscure | Robert van Spyk

5 days ago

Pentester Academy TV took a visit to the Riscure office in San Fransisco to learn more about how they help companies test and secure their products. Check out Riscure here : https://www.riscure.com/a
bout-riscure/ Thanks for watching and don't forget to ...

Pentester Academy | Riscure | Jasper van Woudenberg

5 days ago

Pentester Academy TV took a visit to the Riscure office in San Fransisco to learn more about how they help companies test and secure their products. Check out Riscure here : https://www.riscure.com/a
bout-riscure/ Thanks for watching and don't forget to ...

Pentester Academy | Riscure | Edgar Mateos Santillan

5 days ago

Pentester Academy TV took a visit to the Riscure office in San Fransisco to learn more about how they help companies test and secure their products. Check out Riscure here : https://www.riscure.com/a
bout-riscure/ Thanks for watching and don't forget to ...

Pentester Academy | Riscure | Attack Tree Demonstration

5 days ago

Pentester Academy TV took a visit to the Riscure office in San Fransisco to learn more about how they help companies test and secure their products. Check out Riscure here : https://www.riscure.com/a
bout-riscure/ Thanks for watching and don't forget to ...

Pentester Academy | Riscure

5 days ago

Pentester Academy TV took a visit to the Riscure office in San Fransisco to learn more about how they help companies test and secure their products. Check out Riscure here : https://www.riscure.com/a
bout-riscure/ Thanks for watching and don't forget to ...

Circle City Con 2017 - The Decision Makers Guide To Managing Risk

5 days ago

How do you arrive at the IT decisions you make? What factors do you use in security spending decisions? If you are having a hard time defining this, you are not alone. I am continually surprised at the lack of information organizations have, and still mak ...

Circle City Con 2017 - Effective Report Writing for Security Practitioners

5 days ago

Say more with less! Improve your report writing through tools and technical writing to succinctly present meaningful information that recognizes the need to communicate with three audiences. Security assessments and penetration tests communicate informati ...

Circle City Con 2017 - Why is the Internet still working?

5 days ago

I have noticed that most InfoSec folks, even those coming from a network engineering background, tend to have a limited understanding of how the modern Internet that we all depend up actually works. This talk will be a primer on how today's Internet is pu ...

Circle City Con 2017 - Cybersecurity for real life: Using the NIST Framework to protect your critical infrastructure

5 days ago

Convince the suits why an industrial level of security is right for you. The C-level is terrified of a data breach, but not sure how to justify the resources. The antiquated focus on perimeter defenses overlooks the importance of internal network security ...

Circle City Con 2017 - Fuzzing with AFL

5 days ago

Fuzzing is easy to learn, but hard to master. This will give you an overview of the fuzzer which have become the gold standard of fuzzing, lcamtuf's American Fuzzy Lop (AFL). We'll go over the logic of mutation based fuzzing, how the feedback loop works, ...

Circle City Con 2017 - Talky Horror Picture Show: Overcoming CFP Fears

5 days ago

I see you shiver with anticipation. For those who have never submitted a talk to an infosec conference, the process can seem nebulous and overwhelming. Fear is driven by uncertainty, so let's combat that fear with facts. Come hear a reviewer break down wh ...

Circle City Con 2017 - Everything is Not Awesome: How to Overcome Barriers to Proper Network Segmentation

5 days ago

Attacks are more and more likely to come from internal network sources, possibly being allowed in by unwitting accomplices. While it's commonplace to have a web server DMZ and possibly a guest wireless network, few organizations take any steps to further ...

Circle City Con 2017 - Trials and Tribulations of setting up a Phishing Campaign - Insight into the how

5 days ago

Phishing for clicks is like the VA portion of a Pentest. It feels nice being a hacker, but once you realize you aren't getting command and control, that fuzzy feeling wears off quickly. Everyone knows in theory what Phishing is, what Phishing emails looks ...

Circle City Con 2017 - Tales from the Crypt...(analyst)

5 days ago

As a certified Cryptanalyst for the National Security Agency, the speaker was classically trained in manual cryptography, but also pioneered some of the first computer-based cryptographic systems produced by the agency. Topics discussed will include appli ...

Circle City Con 2017 - DNS Dark Matter Discovery - There's Evil In Those Queries

5 days ago

DNS is the engine that drive the Internet, converting recognizable names into IP addresses behind the scenes. Only recently has the InfoSec community recognized the importance and value of logging DNS traffic and analyzing these logs to detect malicious a ...

Circle City Con 2017 - And the Clouds Break: Continuity in the 21st Century

5 days ago

The promise of cloud computing was a utility; always up, always on, just a click away. But we've seen many outages. It's clearly time to blow the dust off the continuity handbook, and revisit recovery for the twenty-first century. This talk provides an ov ...

Circle City Con 2017 - Opening Keynote: Words Have Meanings

5 days ago

Getting your point across is important. Clear communications are essential. Why is the information security industry packed full of buzzwords, catchy phrases, logos for bugs and jargon that doesn't make sense? Information Security is not only a difficult ...

Circle City Con 2017 - Opening Ceremonies

5 days ago

Circle City Con 2017 - Opening Ceremonies For More information Please Visit:- http://circlecitycon.com/
http://www.irongeek.com/
i.php?page=videos/circlec
itycon2017/mainlist

The Tool Box | Gophish

1 week ago

Today's episode of The Tool Box features Gophish. We breakdown everything you need to know! Including what it does, who it was developed by, and the best ways to use it! Check out Gophish here: Github - https://github.com/gophis
h/gophish Thanks for wat ...

Demo: Reporting of API behavioral security by Dore Rosenblum of Elastic Beam

1 week ago

Dore Rosenblum, VP Marketing and Products, demos Elastic Beam's API security reporting system which collects and categorizes information on attacks such as data infiltration and stolen cookies. This program also has a deception feature which sets up decoy ...

AI-powered API security with Bernard Harguindeguy of Elastic Beam

1 week ago

Founder and CEO Bernard Harguindeguy discusses API security with AI that discovers and scans all APIs within an environment. Since APIs have become commonplace, this sector of security has become a major concern. In response, Elastic Beam utilizes a progr ...

DEF CON 25 BioHacking Village - Jeffrey Tibbetts - Biohackers Die

1 week ago

Over the past decade, the ways we pursue human improvement have become increasingly invasive. We’ve so far been fortunate, but it’s likely if not inevitable that a death will occur due to biohacking. This presentation discusses the many precautions be ...

DEF CON 25 BioHacking Village - John Bass - Medical Industry Disrupt: Blockchain

1 week ago

Over the next ten years, blockchain and distributed ledger technologies will fundamentally change the delivery of care around the globe. The blockchain provides a technical framework where trust is moved from central controlling intermediaries to the open ...

DEF CON 25 BioHacking Village - Jun Axup - The Brave New World of Bio Entrepreneurship

1 week ago

Biotech companies have historically been started by professors from prestigious institutions with millions of dollars of investment funding. Today, with the lowering cost of research and increasing amount of resources driven by Moore's law, robotics, soft ...

DEF CON 25 BioHacking Village - Louis Auguste Jr - Microscopes Are Stupid

1 week ago

Why can't microscopes diagnose disease? What if they could? For the past four years our team from NYU Tandon School of Engineering has been building an IoT system capable of turning a standard microscope into a digital imaging tool. And the goal is to con ...

DEF CON 25 BioHacking Village - Meow Ludo Meow Meow - DIYBioweapons and Regulation

1 week ago

Meow will be presenting on the capabilities for biological weapons that are currently able to be produced in home or community bio labs. He will explore the role that emerging technologies play in drastically reducing the technological and cost barriers t ...

DEF CON 25 BioHacking Village - Paul Ashley - The Future is Fake Identities

1 week ago

In a world filled with danger emanating from all sorts of digital channels, having a proxy (or two) that you create, control, manage and direct is not just useful, but a requirement. Instead of worrying about an ineffectual government or an incomprehensib ...

DEF CON 25 BioHacking Village - RenderMan - Hacking The Internet of Dongs

1 week ago

Among ‘Internet of Things’ security research, there is one branch that no one has wanted to touch, until now: The Internet of Dongs. Internet connected sex toys in all shapes, sizes and capabilities are available on the market with many more being dev ...

DEF CON 25 BioHacking Village - Robin Farmanfarmaian - The Patient as CEO

1 week ago

Robin's expertise showcases the future of medical technology, and how the convergence of accelerating tech will enable patients to be the key decision maker, executor, driver and ultimately the one responsible on the healthcare team. Patient empowerment a ...

DEF CON 25 BioHacking Village - Ryan Schmoll, Peter Hefley - Trigraph: Ethereum-based Teleradiology

1 week ago

Teleradiology is an $8 billion dollar a year industry and we are going to disrupt it. Medical records are critical infrastructure, and with an increasing emphasis on real-time interpretations of medical imagery to improve healthcare outcomes in emergency ...

DEF CON 25 BioHacking Village - Tess Schrodinger - Total Recall: Implicit Learning As Crypto

1 week ago

What is cognitive memory? How can you “implant” a password into it? Is this truly secure? Curiosity around these questions prompted exploration of the research and concepts surrounding the idea of making the authentication process more secure by impla ...

DEF CON 25 BioHacking Village - Tim Cannon - The Moral Imperative of Biohacking

1 week ago

In an era of rapidly evolving technological advances, the ethical and regulatory frameworks are always playing catch up. Biohacking may have consequences that much more serious than traditional technologies. It is critical that as a community we discuss a ...

DEF CON 25 BioHacking Village - Travis Lawrence - Hacking the Second Genetic Code

1 week ago

Recent advances in genome editing have quickly turned ideas thought restricted to science fiction into reality such as custom synthetic organisms and designer babies. These technologies rely on the fidelity of the genetic code, which translates nucleotide ...

Day 3 | Daily December Deals

1 week ago

Check out today's Daily December Deal! http://promo.pente
steracademy.com/decemberd
eals FOLLOW US ON: ~Facebook: http://bit.ly/2uS4pK0 ~Tw
itter: http://bit.ly/2vd5QSE ~In
stagram: http://bit.ly/2v0tnY8 ~Li
nkedIn: http://bit.ly/2ujkyeC ~Go
ogle +: http://bi ...

The Tool Box | Ep 24 | BruteSpray

1 week ago

Today's episode of The Tool Box features BruteSpray. We breakdown everything you need to know! Including what it does, who it was developed by, and the best ways to use it! Check out BruteSpray here: Github - https://github.com/x90sky
sn3k/brutespray Th ...

USENIX Security ’17 - Understanding the Mirai Botnet

1 week ago

Manos Antonakakis, Georgia Institute of Technology; Tim April, Akamai; Michael Bailey, University of Illinois, Urbana-Champaign; Matt Bernhard, University of Michigan, Ann Arbor; Elie Bursztein, Google; Jaime Cochran, Cloudflare; Zakir Durumeric and J. Al ...

USENIX Security '17 - AutoLock: Why Cache Attacks on ARM Are Harder Than You Think

1 week ago

AutoLock: Why Cache Attacks on ARM Are Harder Than You Think Marc Green, Worcester Polytechnic Institute; Leandro Rodrigues-Lima and Andreas Zankl, Fraunhofer AISEC; Gorka Irazoqui, Worcester Polytechnic Institute; Johann Heyszl, Fraunhofer AISEC; Thomas ...

USENIX Security '17 - CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management

1 week ago

Adrian Tang, Simha Sethumadhavan, and Salvatore Stolfo, Columbia University Distinguished Paper Award Winner! The need for power- and energy-efficient computing has resulted in aggressive cooperative hardware-software energy management mechanisms on mode ...