Posted by david b.
on November 13, 2015
Chris Rock focuses on virtual birthing here, describing a way to create a nonexistent baby, which is a new identity that can be used to one’s advantage.
Okay, I’ve been given the wrap-up, so I’m going to go through this quickly. Now that we’ve killed somebody, what about birthing? It’s nearly the...
Posted by david b. on November 6, 2015
Becoming a funeral director, registering a fake death online and then getting access to someone’s funds are perfectly feasible tasks, Chris Rock argues.
Instead of doing the fraudulent case of a funeral director, I...
Posted by David Balaban on November 4, 2015
The controversial story of DNS Unlocker software got a kick-off into the public realm with a thread created on VIDCreek.tv online sharing community. In early June 2015, the site admin announced a project purportedly...
Posted by david b. on October 31, 2015
After the introduction, Chris Rock demonstrates how easy it is for a hacker to access and manipulate the Electronic Death Registration System.
How does a doctor get access to EDRS, or how does a hacker get access to...
Posted by david b. on October 23, 2015
In the course of his DefCon 23 presentation, Australian security expert Chris Rock demonstrates how fake death or birth records can be created these days.
DefCon host: When I was going through the schedule trying to see...
Posted by david b. on October 11, 2015
As this ShmooCon presentation is coming to an end, Andrew Morris dwells on defenses against the attacks and shares his plans regarding the upcoming projects.
So, a couple of defensive strategies...
Posted by david b. on October 2, 2015
Andrew Morris presents his automated threat reporting system called the Animus and the interactive Threatbot tool powered by the existing attacker database.
Threat Reporting Automation
So, now I’m going to talk about...
Posted by david b. on September 25, 2015
Having deliberately exposed a honeypot machine to attackers, Andrew Morris got a lot of incoming malware data, which he then reversed to get a better insight.
Reversing these samples (see right-hand image) is a talk in...
Posted by david b. on September 20, 2015
Andrew Morris has got some great points on the vulnerabilities prevalently used by remote attackers on the Internet, so read this part to learn what those are.
Discovery & Investigation
We are now going to talk...