From BruCON 2015
(newest | oldest) View (newer 20 | older 20) (20 | 50 | 100 | 250 | 500)
- 21:44, 9 September 2014 (diff | hist) . . (+564) . . N Daan Raman (Created page with "Daan Raman works at NVISO, where he is responsible for R&D. His core activities consist of technical research with a current focus on application security for mobile systems....") (current)
- 21:43, 9 September 2014 (diff | hist) . . (+8) . . Schedule (→BruCON 0x06 Line-Up)
- 21:43, 9 September 2014 (diff | hist) . . (+898) . . N The dirty secrets of client-side exploitation and protection (Created page with "It’s no secret that client-side attacks are what gets attackers a foothold on the network, allowing them to wreak havoc and exfiltrate precious business data. Performing cli...") (current)
- 21:42, 9 September 2014 (diff | hist) . . (+146) . . N Daniela Zapata (Created page with "Daniela is a computer engineering student which from an early age has been interested in computer security, hacking stuff and messing in troubles.") (current)
- 21:42, 9 September 2014 (diff | hist) . . (+1,119) . . N Wim Remes (Created page with "As a Managing Consultant at IOActive, Wim Remes leverages his 15 years of security leadership experience to advise clients on reducing their risk posture by solving complex se...") (current)
- 21:42, 9 September 2014 (diff | hist) . . (+17) . . Schedule (→BruCON 0x06 Line-Up)
- 21:40, 9 September 2014 (diff | hist) . . (+75) . . N Snare (Created page with "A lawyer for the mayor's office and also the world's strongest millionaire.") (current)
- 21:39, 9 September 2014 (diff | hist) . . (+607) . . N Thunderbolts and Lightning / Very, Very Frightening (Created page with "People keep talking about Thunderbolt DMA attacks as though they're a foregone conclusion. Prior to doing this research, we hadn't seen one that didn't involve using a Thunder...") (current)
- 21:39, 9 September 2014 (diff | hist) . . (+12) . . Schedule (→BruCON 0x06 Line-Up)
- 21:37, 9 September 2014 (diff | hist) . . (+590) . . N Veteran startup CTO and author focused on bringing security and privacy to customers. Currently doing so at Microsoft. (Created page with "Everyone knows you ought to threat model, but in practical reality it turns out to be tricky. If past efforts to threat model haven't panned out, perhaps part of the problem i...") (current)
- 21:37, 9 September 2014 (diff | hist) . . (+4) . . Schedule (→BruCON 0x06 Line-Up)
- 21:36, 9 September 2014 (diff | hist) . . (+21) . . Xavier Mertens (current)
- 21:35, 9 September 2014 (diff | hist) . . (+2) . . Xavier Mertens
- 21:35, 9 September 2014 (diff | hist) . . (+420) . . N Network device forensics (Created page with "Memory forensics is the next step the forensic community has taken. In this workshop, you can learn memory forensics for Cisco IOS. Learn how to use the Network Appliance For...") (current)
- 21:34, 9 September 2014 (diff | hist) . . (+876) . . N Xavier Mertens (Created page with "Xavier Mertens is an independent security consultant. His job focuses mainly on protecting his customer's resources by applying "offensive" (pentesting) as well as "defensive"...")
- 21:34, 9 September 2014 (diff | hist) . . (+344) . . N Didier Stevens (Created page with "Didier Stevens (Security Consultant, Didier Stevens Labs, Contraste Europe NV) is an IT security professional well known for his security and forensic tools, like the Network...") (current)
- 21:33, 9 September 2014 (diff | hist) . . (+2,127) . . N Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android (Created page with "In today’s day and age, there are literally hundreds of presentations, blogs, and trainings on how to hack an Android application. Unfortunately, most talks tend to fall sho...") (current)
- 21:33, 9 September 2014 (diff | hist) . . (+892) . . N Jake Valletta (Created page with "Jake is a consultant at Mandiant in their New York office. His areas of interest include mobile security, application security, penetration testing, and incident response. His...") (current)
- 21:33, 9 September 2014 (diff | hist) . . (+8) . . Schedule (→BruCON 0x06 Line-Up)
- 21:31, 9 September 2014 (diff | hist) . . (+1,484) . . N Stealing a Mobile Identity Using Wormholes (Created page with "Authentication in mobile networks is usually done using a secure element which is commonly a SIM-Card. It is a tamper resistant device that should prevent cloning of mobile id...") (current)
(newest | oldest) View (newer 20 | older 20) (20 | 50 | 100 | 250 | 500)