Quantcast

Archive: Oct 2015

I will kill you. Part 2: Accessing EDRS

After the introduction, Chris Rock demonstrates how easy it is for a hacker to access and manipulate the Electronic Death Registration System. How does a doctor get access to EDRS, or how does a hacker get access to EDRS? Here is a form that the doctor will fill out (see right-hand image), with the obvious...

Chris Rock – I will kill you

In the course of his DefCon 23 presentation, Australian security expert Chris Rock demonstrates how fake death or birth records can be created these days. DefCon host: When I was going through the schedule trying to see what speakers we’re going to be watching, I saw this description and said “Oh yeah, I...

No Budget Threat Intelligence 6: Defensive Strategies

As this ShmooCon presentation is coming to an end, Andrew Morris dwells on defenses against the attacks and shares his plans regarding the upcoming projects. Defensive Strategies So, a couple of defensive strategies (see right-hand image). It’s, basically, standard threat intelligence stuff, whatever you...

No Budget Threat Intelligence 5: Automation

Andrew Morris presents his automated threat reporting system called the Animus and the interactive Threatbot tool powered by the existing attacker database. Threat Reporting Automation So, now I’m going to talk about automating a lot of the stuff that I have been talking about so far. There’s this thing...