security.didici.cc

TekThing 161 – Bitcoin Sucks For Gaming PCs!!! Our Video Gear, Fingbox Home Network Security

1 month ago

—— Thank You Patrons! Without your support via patreon.com/tekthing, we wouldn’t be able to make the show for you every week! https://www.patreon
.com/tekthing EMAIL US! [email protected] SUPPORT: Amazon Associates: http://amzn.to/2xbnsUa Su
bscribe: ...

FISA Lives On & The NSA Keeps Surveillance Authority – ThreatWire

1 month ago

The NSA can legally monitor some communications, some google chrome extensions were found to be malicious, and OnePlus had a credit card hack. All that coming up now on ThreatWire. ————
—————- Shop: http://www.hakshop.com Su
pport: http ...

How to setup Metasploitable 3 – Metasploit Minute

1 month ago

Metasploit Minute – the break down on breaking in. Join Mubix (aka Rob Fuller) every Monday here on Hak5. Thank you for supporting this ad free programming. Sponsored by Hak5 and the HakShop – http://hakshop.com :: Subscribe and learn more at http://m ...

TekThing 160 – Anker Roav VIVA Alexa Car Charger, 33 More CES 2018 Products, Razer Linda vs. Sentio Superbook

1 month ago

CES Trends, 33 More CES 2018 Products! Anker Roav VIVA Alexa Enabled Car Charger, Razer Linda vs. Sentio Superbook —— 01:14 CES TRENDS What was driving CES 2018 this year? AI that’s not so I, Voice Assistance and Commands (Google Assistant was every ...

Meltdown and Spectre – Everything You Need To Know – ThreatWire

1 month ago

Everything you need to know about Spectre and Meltdown. All that coming up now on ThreatWire. ————
—————- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Site: http://w ...

Hak5 2319 – [[ PAYLOAD ]] – OS Detection Payload

1 month ago

————————
—- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Site: http://www.hak5.org Conta
ct Us: http://www.twitter.com/ha
k5 Threat Wire RSS: https://shannonmorse.podb ...

TekThing 159 – CES 2018! New TVs From LG, Samsung, TCL, HiSense, Virtual Reality, 1TB Flash Drives, and more!

1 month ago

For those that requested it, here are each of our CES 2018 segments exported into one long video! These are the same segments already uploaded to Youtube, just clumped into one video. Thank you for supporting our coverage of CES! —— Luggage That Follo ...

Hak5 2318 – [[ PAYLOAD ]] – Best Payload Practices

1 month ago

————————
—- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Site: http://www.hak5.org Conta
ct Us: http://www.twitter.com/ha
k5 Threat Wire RSS: https://shannonmorse.podb ...

TekThing 158 – New Dell XPS 13, HP Chromebooks, CES 2018, More Reasons Your Computer Gets Fried, Kill-A-Watt!!!

1 month ago

New Laptops! Dell XPS 13, HP HP Chromebook 14 G5 and 11 G6 Education Edition! CES 2018, Floating Neutral, Kill-A-Watt —— 00:56 TekThing Meetup Las Vegas Happy New Year!!! If you’re in Las Vegas for CES, live in Las Vegas, or feel like getting yourse ...

Hak5 2317 – [[ PAYLOAD ]] – The Situation Response Payload

1 month ago

————————
—- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Site: http://www.hak5.org Conta
ct Us: http://www.twitter.com/ha
k5 Threat Wire RSS: https://shannonmorse.podb ...

Snowden’s New Security System; Browsing Tracked By Login Forms – ThreatWire

1 month ago

Your browsing data could be tracked by login forms, Forever21 got hacked, and Snowden released his very own mobile security system. All that coming up now on ThreatWire. ————
—————- Shop: http://www.hakshop.com Su
pport: http://www.patr ...

Hak5 2316 – The Hak5 Annual Blooper Reel!

1 month ago

Celebrate another year of craziness with us by checking out some of our favorite bloopers from 2017! Happy New Year and we’ll see ya next week! ——————
———- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subs ...

TekThing 157 – Amazon Echo Spot Review, Best Gear of 2017, Can You Speed Up Your VPN???

1 month ago

Best of 2017: TVs, Phones, Headphones, More. The Perfect Alarm Clock? Amazon Echo Spot Review. Two Fast VPNs Tested! —— 00:50 BEST OF 2017!!! What were the products that really stood out in 2017??? AMD’s Ryzen CPUs and Nvidia’s Switch are definite ...

The Biggest Hacks of 2017 – ThreatWire

2 months ago

The biggest, baddest, worst hacks and vulnerabilities of 2017! All that coming up now on ThreatWire. ————
—————- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Site: h ...

GrrCon 2017 - Infrastructure Based Security

2 months ago

As the enterprise continues to be bombarded with advanced and increasingly more sophisticated attacks, the CISO must shift to accomplish three critical objectives: Gain Superior Visibility and Control over their environment, Automate tasks that enhance se ...

GrrCon 2017 - The Shuttle Columbia Disaster: Lessons That Were Not Learned

2 months ago

When the shuttle Challenger was destroyed in 1986, poor NASA culture was significant in the events the led to the disaster. NASA made serious changes to their space program to ensure human life was at the least risk possible. But in 2003, the shuttle Colu ...

GrrCon 2017 - Software Defined Segmentation

2 months ago

Acquisitions, partnerships, BYOD, IoT are just some business demands that increase security headaches for businesses and place demand on IT. Come explore segmentation as a mechanism to combat compromises of one system to another. For More Information Pl ...

GrrCon 2017 - Building a Usable Mobile Data Protection Strategy

2 months ago

Mobile smart devices from the consumer perspective are easy to activate for a enriched user experience. Enable smart devices in the enterprise, after the basics, the user experience they know drops while users and InfoSec demand more with competing agenda ...

GrrCon 2017 - The Future of Cyber Security

2 months ago

GrrCon 2017 - The Future of Cyber Security For More Information Please Visit:- http://www.grrcon.com/ ht
tp://www.irongeek.com/i.p
hp?page=videos/grrcon2017
/mainlist

GrrCon 2017 - Securing the Internet of Things (IoT) -Through Security Research and Vulnerability Analysis

2 months ago

GrrCon 2017 - Securing the Internet of Things (IoT) -Through Security Research and Vulnerability Analysis For More Information Please Visit:- http://www.grrcon.com/ ht
tp://www.irongeek.com/i.p
hp?page=videos/grrcon2017
/mainlist

GrrCon 2017 - Tales From The Trenches: Practical Information Security Lessons

2 months ago

In this talk, Michael Belton discusses his past experiences delivering penetration testing services. The format for this talk is conversational and audience participation is encouraged. Michael will provide background on the situation, discuss the actual ...

GrrCon 2017 - How do you POC? Are you really testing a product

2 months ago

We have all read the reports from the successful breaches from Target to Equifax. Have you ever questioned the nature of the security products not preventing or alerting earlier to breach? Trend Micro,s presentation will focus on the Proof-of-Concept phas ...

GrrCon 2017 - Infosec State of Affairs: Too much Kim Kardashian - not enough Malcolm Gladwel

2 months ago

GrrCon 2017 - Infosec State of Affairs: Too much Kim Kardashian - not enough Malcolm Gladwel For More Information Please Visit:- http://www.grrcon.com/ ht
tp://www.irongeek.com/i.p
hp?page=videos/grrcon2017
/mainlist

GrrCon 2017 - Dissecting Destructive Malware and Recovering from Catastrophe

2 months ago

An in depth look into the NotPetya malware outbreak from a boots-on-ground incident responder with first-hand experience assisting organizations through response, recovery and investigation. This talk will cover how NotPetya operates, the geopolitical sig ...

The Tool Box | SessionGopher

2 months ago

Today's episode of The Tool Box features SessionGopher. We breakdown everything you need to know! Including what it does, who it was developed by, and the best ways to use it! Check out Session Gopher here: Github - https://github.com/fireey
e/SessionGo ...

DEF CON 25 Packet Hacking Village - Marek Majkowski - IP Spoofing

2 months ago

At Cloudflare we deal with DDoS attacks every day. Over the years, we've gained a lot of experience in defending from all different kinds of threats. We have found that the largest attacks that cause the internet infrastructure to burn are only possible d ...

DEF CON 25 Packet Hacking Village - Megan Roddie - Strengthen Secops By Leveraging Neurodiversity

2 months ago

High productivity, extreme attention to detail, logical/calculated, passionate, and hyper-focused. These are all characteristics considered valuable in the information security industry. However, a certain group of people who exceed expectations in these ...

DEF CON 25 Packet Hacking Village - Michael Gianarakis ,Keith Lee - Portia

2 months ago

Portia: it's a new tool we have written at SpiderLabs to aid in internal penetration testing test engagements. The tool allows you to supply a username and password that you have captured and cracked from Responder or other sources as well as an IP ranges ...

DEF CON 25 Packet Hacking Village - Mike Raggo, Chet Hosmer - Covert TCP with a Twist

2 months ago

Taking a modern day look on the 20 year anniversary of Craig Rowland's article on Covert TCP, we explore current day methods of covert communications and demonstrate that we are not much better off at stopping these exploits as we were 20 years ago. With ...

DEF CON 25 Packet Hacking Village - Peter Ewane - Cloudy With A Chance of Persistence

2 months ago

The use of Amazon Cloud as a base of operations for businesses is increasing at a rapid rate. Everyone from 2 person start-ups to major companies have been migrating to the cloud. Because of this migration, cloud vendors have become the focus of potential ...

DEF CON 25 Packet Hacking Village - Sam Erb - You're Going to Connect to the Wrong Domain Name

2 months ago

Can you tell the difference between gооgle.com and google.com? How about xn--ggle-55da.com and google.com? Both domain names are valid and show up in the Certificate Transparency log. This talk will be a fun and frustrating look at typosquatting, bitsqu ...

DEF CON 25 Packet Hacking Village - Brute Logic - XSS For the win

2 months ago

Cross-site Scripting (XSS) is the most widespread plague of the web but is usually restricted to a simple popup window with the infamous vector. In this short talk we will see what can be done with XSS as an attacker or pentester and the impact of it for ...

DEF CON 25 Packet Hacking Village - Ron Taylor - Demystifying The OPM breach, WTF Really Happened

2 months ago

In September 2016 the House Committee on oversight finally released their report. Four years after the original breach, we are still asking how the f*#! did this happen. This talk with go over the key findings of the report and the impact on those who wer ...

DEF CON 25 Packet Hacking Village - Tan Kean Siong - Stories from a 15 days SMB Honeypot Mum

2 months ago

WannaCry, Eternal Blue, SambaCry are the popular topic recently. During the outbreak in May 2017, we designed a 'real' Windows 7 / Samba server with the open source Dionaea honeypot and exposed the favourable SMB port to the world. There are tons of expec ...

DEF CON 25 Packet Hacking Village - Tom Sela - Fooling the Hound Deceiving Doman Admin Hunters

2 months ago

The conflict between cyber attackers and defenders is too often in favor of attackers. Recent results of graph theory research incorporated into red-team tools such as BloodHound, shift the balance even more dramatically towards attackers. Any regular dom ...

DEF CON 25 Packet Hacking Village - Vivek Ramachandran,Thomas d'Otreppe - Make a 802.11AC Monitor

2 months ago

802.11ac networks present a significant challenge for scalable packet sniffing and analysis. With projected speeds in the Gigabit range, USB Wi-Fi card based solutions are now obsolete! In this workshop, we will look at how to build a custom monitoring so ...

DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation

2 months ago

On March 17th, Cisco Systems Inc. made a public announcement that over 300 of the switches it manufactures are prone to a critical vulnerability that allows a potential attacker to take full control of the network equipment. This damaging public announce ...

USENIX Security '17 - Data Hemorrhage, Inequality, and You: How Technology and Data Flows are Changing the Civil Liberties Game

2 months ago

Data Hemorrhage, Inequality, and You: How Technology and Data Flows are Changing the Civil Liberties Game Shankar Narayan, Technology and Liberty Project Director, American Civil Liberties Union of Washington Rapidly growing data flows and game-changing ...

USENIX Security '17 - Qapla: Policy compliance for database-backed systems

2 months ago

Aastha Mehta and Eslam Elnikety, Max Planck Institute for Software Systems (MPI-SWS); Katura Harvey, University of Maryland, College Park and Max Planck Institute for Software Systems (MPI-SWS); Deepak Garg and Peter Druschel, Max Planck Institute for Sof ...

USENIX Security '17 - Ensuring Authorized Updates in Multi-user Database-Backed Applications

2 months ago

Kevin Eykholt, Atul Prakash, and Barzan Mozafari, University of Michigan Ann Arbor Database-backed applications rely on access control policies based on views to protect sensitive data from unauthorized parties. Current techniques assume that the applica ...

USENIX Security '17 - REM: Resource-Efficient Mining for Blockchains

2 months ago

Fan Zhang, Ittay Eyal, and Robert Escriva, Cornell University; Ari Juels, Cornell Tech; Robbert van Renesse, Cornell University Blockchains show promise as potential infrastructure for financial transaction systems. The security of blockchains today, how ...

USENIX Security '17 - SmartPool: Practical Decentralized Pooled Mining

2 months ago

Loi Luu, National University of Singapore; Yaron Velner, The Hebrew University of Jerusalem; Jason Teutsch, TrueBit Foundation; Prateek Saxena, National University of Singapore Cryptocurrenci
es such as Bitcoin and Ethereum are operated by a handful of mi ...

USENIX Security '17 - A Privacy Analysis of Cross-device Tracking

2 months ago

Sebastian Zimmeck, Carnegie Mellon University; Jie S. Li and Hyungtae Kim, unaffiliated; Steven M. Bellovin and Tony Jebara, Columbia University Online tracking is evolving from browser- and device-tracking to people-tracking. As users are increasingly a ...

USENIX Security '17 - Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks

2 months ago

Tao Wang, Hong Kong University of Science and Technology; Ian Goldberg, University of Waterloo Website fingerprinting (WF) is a traffic analysis attack that allows an eavesdropper to determine the web activity of a client, even if the client is using pri ...

USENIX Security '17 - Beauty and the Burst: Remote Identification of Encrypted Video Streams

2 months ago

Roei Schuster, Tel Aviv University, Cornell Tech; Vitaly Shmatikov, Cornell Tech; Eran Tromer, Tel Aviv University, Columbia University The MPEG-DASH streaming video standard contains an information leak: even if the stream is encrypted, the segmentation ...

USENIX Security '17 - "I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS

2 months ago

Katharina Krombholz, Wilfried Mayer, Martin Schmiedecker, and Edgar Weippl, SBA Research Protecting communication content at scale is a difficult task, and TLS is the protocol most commonly used to do so. However, it has been shown that deploying it in a ...

Circle City Con 2017 - Peakaboo - I own you: Owning hundreds of thousands of devices with a broken HTTP packet

2 months ago

Imagine that you've purchased your small a cheap ip security camera to feel just a little better with your own physical security. Now imagine that the people who designed that camera know nothing about secure programming, security or programming at all. I ...

Circle City Con 2017 - Creating Your Own Customized Metamorphic Algorithm

2 months ago

Most malware uses metamorphic code to evade Antivirus detection. These techniques also slow down security researchers when digging deeper into the malware code. On the malware side, there are many ways to generate and implements the said algorithms, yet o ...

Circle City Con 2017 - Ichthyology: Phishing as a Science

2 months ago

Many companies view phishing as a given: employees will click links and enter credentials, and we just need to be okay with that. Phishing prevention usually takes the form of training, and a warning to be careful when reading email. But does phishing tra ...

Circle City Con 2017 - We Don't Always Go Lights and Sirens

2 months ago

One of the most critical steps to Incident Response is the initial triage phase. The same can be said of the decision Paramedics make when responding to emergency calls. During this presentation we will review how to properly triage an incident based on t ...

Circle City Con 2017 - You're not old enough for that: A TLS extension to put the past behind us

2 months ago

TLS evolves rapidly. We don't all have the luxury of upgrading with it, unfortunately; new versions, extensions, cipher suites, and protocols require mutual support. This poses a serious problem for those who have legacy systems that cannot be upgraded (t ...

Circle City Con 2017 - Changing our future with 3D Printing

2 months ago

3D Printing represents the last tool that will be necessary is shifting into our new 21st century economy, as we finally break ourselves free from the shackles of the wealth inequality generated during the first three and a half industrial revolutions and ...

Circle City Con 2017 - See beyond the veil: Automating malicious javascript deobfuscation

2 months ago

Exploit kits use javascript to direct victim browsers to hosted exploits. These javascript are highly obfuscated to mask their intent and make analysis more difficult. Deobfuscating it manually is time consuming and does not scale. This talk with discuss ...

Circle City Con 2017 - Open Sesamee

2 months ago

Resettable combination locks are popular because they can be set to user-chosen codes. Multiple locks can be set alike to one another. Authorized users don't have to keep track of key or other physical credentials. These locks are often used to control ac ...

Circle City Con 2017 - The State of Security in the Medical Industry

2 months ago

Bringing awareness to the pain felt in the healthcare industry from a security standpoint, what attackers are targeting, and how the industry needs to steer itself to prevent further patient risk and mishandling of data. @cannibal has spent 10 years work ...

Circle City Con 2017 - Of Flags, Frogs and 4chan: OPSec vs. Weaponized Autism

2 months ago

This talk will tell the stories of people who got their data leaked, or trolled hard by 4chan because of bad OPSec, and what they could have done better. Internet Hate Machine: Because none of us as are cruel as all of us. ShowMeConVersion because I acci ...

Hak5 2315 – 3D Printer Filaments Explained

2 months ago

Join Shannon Morse and David Randolph to discuss 3D printer filaments and how to shop for the best ones. Special thanks to David from https://printedsolid.com/ for guest hosting this episode! —————
————- Shop: http://www.hakshop.com Su ...

Triton Malware Threatens Lives & The Net Neutrality Repeal – A History – Threat Wire

2 months ago

A history of ISP regulations, new malware is infecting industrial control systems, and three men plead guilty in the Mirai botnet case. All that coming up now on ThreatWire. ————
—————- Shop: http://www.hakshop.com Su
pport: http://www. ...

Circle City Con 2017 - Application Security Metrics

2 months ago

What's your current level of confidence in your application security program? Are you tracking any pen test metrics? Maybe you should. This session will detail several application security metrics used to measure the effectiveness of penetration testing a ...

The Tool Box | QRLJacking

2 months ago

Today's episode of The Tool Box features QRLJacking. We breakdown everything you need to know! Including what it does, who it was developed by, and the best ways to use it! Check out QRLJacking here: Github - https://github.com/OWASP/
QRLJacking Website ...

GrrCon 2017 - Change is Simply an Act of Survival: Predicting the future while shackled to the past

2 months ago

This presentation will briefly review the history and development of the corporate network, it,s interaction with the Internet and how the adoption of SaaS and PaaS base solutions have rendered the network irrelevant from a security perspective. We will e ...

GrrCon 2017 - The Black Art of Wireless Post-Exploitation

2 months ago

Wireless is an inherently insecure protocol. Most companies recognize this, and focus their resources on minimizing the impact of wireless breaches rather than preventing them outright. During red team engagements, the wireless perimeter is cracked within ...

GrrCon 2017 - Hidden Treasure: Detecting Intrusions with ETW

2 months ago

Today, defenders consume the Windows Event Log to detect intrusions. While useful, audit logs don,t capture the full range of data needed for detection and response. ETW (Event Tracing for Windows) is an additional source of events that defenders can leve ...

GrrCon 2017 - A Reporter's Look at Open Source Intelligence

2 months ago

Governmental and private agencies provide a vast amount of publicly-available information on individuals and companies for those driven or savvy enough to find it. This talk aims to ease the digital and bureaucratic guesswork from the perspective of an in ...

GrrCon 2017 - A Reporter's Look at Open Source Intelligence

2 months ago

Governmental and private agencies provide a vast amount of publicly-available information on individuals and companies for those driven or savvy enough to find it. This talk aims to ease the digital and bureaucratic guesswork from the perspective of an in ...

GrrCon 2017 - Learning from InfoSec Fails

2 months ago

This presentation will highlight some of the reasons why InfoSec either fails or is perceived to fail. People, Process, and Technology issues will be presented with examples. The goal of this talk is to allow people to pick up some pointers for doing thin ...

GrrCon 2017 - Threat Intelligence: Zero to Basics in presentation

2 months ago

This is an audience participation talk, on going from having DFIR with no Threat Intelligence to building a basic threat intelligence program. The majority of the data needed to start a Threat Intelligence program is probably already being captured by the ...

GrrCon 2017 - A GRReat New Way of Thinking about Innovating for Cyber Defense (and even Cyber Offense)

2 months ago

Since the origins of the Republic, the American people have shown a strong speculative knack that lead to novel ideas for tackling tough problems. From the first American colonists who made do with limited resources, to NASA astronauts who boldly explored ...

GrrCon 2017 - vAp0r and the Blooming Onion

2 months ago

vAp0r is a Linux distro that brings together a specific set of tools to allow for secure Tor use on the Raspberry Pi 3. Due to the standard Tor Browser bundle,s inability to support the ARMHF architecture. Included in the distro is Mozilla Firefox setup a ...

GrrCon 2017 - ProbeSpy: Tracking your past, predicting your future

2 months ago

As infosec enthusiasts and professionals, may of us are acutely aware that our devices may be giving away their current location as they sit in our pockets. What if I told you that your device may also be revealing where you,ve been and where you may be g ...

TekThing 155 – Tech Gifts for Travelers! Amazon Cloud Cam Review, Test Your Home Network Speed!

2 months ago

Tech Gifts for Travelers! Amazon Cloud Cam Review, Test Your Home Network Speed, $10,000 Surge Protector Save! —– 03:26 Amazon Cloud Cam When Canary Security Cameras dropped several of the features that came in the free plan, and paywalled the built i ...

DEF CON 25 - Avi Bashan, Slava Makkaveev - Everything to know about Android packers

2 months ago

To understand the Android ecosystem today, one must understand Android packers. Whether used for protecting legitimate apps' business logic or hiding malicious content, Android packer usage is on the rise. Android packers continue to increase their effort ...

DEF CON 25 Packet Hacking Village - Catherine Ullman, Chris Roberts - Breaking the Bad News

2 months ago

Enabling better communications between geeks and management. As humans, we have had 60,000 years to perfect communication, but those of us working in IT, regardless of which side (Blue or Red Team), still struggle with this challenge. We have done our bes ...

DEF CON 25 Packet Hacking Village - Chris Wysopal - How Hackers Changed the Security Industry

2 months ago

Before hackers got involved in cybersecurity the industry was focused on products and compliance. Security was security features: firewalls, authentication, encryption. Little thought was given to vulnerabilities that allowed the bypassing of those featur ...

DEF CON 25 BioHacking Village - C00p3r, Cur50r - Implantable Technology Show and Tell

2 months ago

Through sharing experiences learned first hand and through work on the Dangerous Minds Podcast, c00p3r will be introducing you to implantable technology, explaining the basic products that are available on the market now, from where, as well as provide a ...

DEF CON 25 BioHacking Village - Christopher Frenz - Standardizing Deployment Of Medical Devices

2 months ago

In recent months it seems like not a week passes where you do not encounter a headline that states that a healthcare organization has been held for ransom or in some other way involved in a breach. Healthcare has been a sector that has routinely been desc ...

DEF CON 25 BioHacking Village - Stanislav Naydin, Vlad Gostomelsky - Medical Device Ethics

2 months ago

We will engage the audience in a discussion of modern technological advances along with their ethical implications. We live in an era where the very implanted hardware that keeps you alive can be evidence in the court of law. Neuroscience is now a tool us ...

DEF CON 25 BioHacking Village - Amanda Plimpton, Evan Anderson - Psychoactive Chemicals in Combat

2 months ago

By looking at key experiments and trials done by the military we can learn about psychoactive chemicals and protocols that work, and don’t work, on humans. From biological enhancement to chemical deterrents, there is a wealth of information that grassro ...

DEF CON 25 BioHacking Village - Edward You - Biotechnology Needs A Security Patch Badly

2 months ago

What talk? Its going to be a theatrical song and interpretive dance related to the 5 w's and how to fix our bio economy. You get it, I know you do. For More Information Please Visit:- https://defcon.org/

DEF CON 25 BioHacking Village - Gingerbread - Neurogenic Peptides Smart Drugs 4 Minute Mile

2 months ago

Everything is impossible until it isn't. Every undertaking, defined by the hard limitations at the edges of our possible achievement. Lossless electrical conductivity, human travel beyond the sound 'barrier', running a four-minute mile...each, seen as s ...

DEF CON 25 BioHacking Village - Jay Radcliffe - The Scientific Method in Security Research

2 months ago

One of the huge criticisms of Security research is the lack of process and adherence to traditional research methods. Quite often our "research" is just tearing apart systems and exposing their vulnerabilities. While this is useful, there is a better way. ...

The Tool Box | Pupy

2 months ago

Today's episode of The Tool Box features Pupy. We breakdown everything you need to know! Including what it does, who it was developed by, and the best ways to use it! Check out Pupy here: Github - https://github.com/n1nj4s
ec/pupy Thanks for watching an ...

Circle City Con 2017 - How To Be Curious

2 months ago

Curiosity. It's not just for killing cats. In fact, it's *the heart* of the hacker mindset. Like many seemingly abstract mental qualities, those on the outside or those at the start of their journey can be left in the cold, wondering if they've ???got it ...

Circle City Con 2017 - Ph'ing Phishers

2 months ago

Credential phishing is super lame. Sadly it's one of the main workhorses behind financing so much bad stuff that it deserves to be smacked around by a large trout. Over the past year I've written automation to help turn a monumentally mundane task of scra ...

Circle City Con 2017 - The Kids Aren't Alright: Security and K-12 Education in America

2 months ago

"Stupid users!" is a common lament. But users aren't stupid, they're just following their training. What is the education that users are getting? This talk will cover the training--or lack thereof--that is being given in American schools, the root of the ...

Circle City Con 2017 - Threat Intelligence: Zero to Basics

2 months ago

This is an audience participation talk, on going from having DFIR with no Threat Intelligence to building a basic threat intelligence program. The majority of the data needed to start a Threat Intelligence program is probably already being captured by the ...

Circle City Con 2017 - Network manipulation on video games.

2 months ago

I will go over common misnomers of online cheating methods. Explain the realistic side of why Peer to Peer games can be broken. I will showcase a method I PoC 5 years ago, yet I haven't seen this type of manipulation displayed online (video demo). I will ...

Circle City Con 2017 - OSINT And Your World A Love Story Michael James

2 months ago

Circle City Con 2017 - OSINT And Your World A Love Story Michael James For More information Please Visit:- http://circlecitycon.com/
http://www.irongeek.com/
i.php?page=videos/circlec
itycon2017/mainlist

Circle City Con 2017 - It's A Disaster!

2 months ago

You don't know what you don't know. There are things we have no control over. Natural disasters, acts of god, kids and spitup. We do, however, have the benefit of history and experience. But as security bears out, we are selective in what we choose to lea ...

Circle City Con 2017 - Detecting DNS Anomalies with Statistics

2 months ago

Defending against attackers has become increasingly difficult. Solutions using signature based detection such as IPS and anti-virus are still needed, but no longer prevent all malware or virus infections. What can be done to improve the ability to prevent ...

Circle City Con 2017 - Network Security? What About The Data?

2 months ago

The data is the ultimate prize for threat actors. Bypassing the firewall is not their goal, but is rather a mere necessity. I am going to propose a possible different approach that better addresses data security than the network-centric model that is comm ...

Circle City Con 2017 - Security Training: Making Your Weakest Link The Strongest

2 months ago

It is a common joke amongst security professionals that the weakest link in any organizations security is the employees- the so-called "human element". The unfortunate part about this joke is that it's entirely accurate. The common approach to solving thi ...

Circle City Con 2017 - Application Security Metrics

2 months ago

What's your current level of confidence in your application security program? Are you tracking any pen test metrics? Maybe you should. This session will detail several application security metrics used to measure the effectiveness of penetration testing a ...

Day 11 | Daily December Deals

2 months ago

Check out today's Daily December Deal! http://promo.pente
steracademy.com/decemberd
eals FOLLOW US ON: ~Facebook: http://bit.ly/2uS4pK0 ~Tw
itter: http://bit.ly/2vd5QSE ~In
stagram: http://bit.ly/2v0tnY8 ~Li
nkedIn: http://bit.ly/2ujkyeC ~Go
ogle +: http://bi ...

USENIX Security '17 - Measuring HTTPS Adoption on the Web

2 months ago

Adrienne Porter Felt, Google; Richard Barnes, Cisco; April King, Mozilla; Chris Palmer, Chris Bentzel, and Parisa Tabriz, Google HTTPS ensures that the Web has a base level of privacy and integrity. Security engineers, researchers, and browser vendors ha ...

USENIX Security '17 - A Longitudinal, End-to-End View of the DNSSEC Ecosystem

2 months ago

Taejoong Chung, Northeastern University; Roland van Rijswijk-Deij, University of Twente and SURFnet bv; Balakrishnan Chandrasekaran, TU Berlin; David Choffnes, Northeastern University; Dave Levin, University of Maryland; Bruce M. Maggs, Duke University an ...

USENIX Security '17 - ROTE: Rollback Protection for Trusted Execution

2 months ago

Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, and Arthur Gervais, ETH Zurich; Ari Juels, Cornell Tech; Srdjan Capkun, ETH Zurich Security architectures such as Intel SGX need protection against rollback attacks, where the adv ...