Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

Steal Everything, Kill Everyone, Cause Total Financial Ruin 3: Countermeasures of Theft

Jayson E. Street now illustrates some of his security assessments with photos and descriptions of how easily corporate and employees’ property can be stolen. I love this one. This is what I call the trifecta bad, because, yes, I stole the phone or cloned it; yes, I’ve got the laptop – 30 laptops...

Steal Everything, Kill Everyone, Cause Total Financial Ruin 2: I’m Getting In

Jayson E. Street’s subject in this part is the different tricks to apply during penetration engagements, and the rules he sticks to in his work. Now I’m not talking about social engineering part so much, as this is all the damage I’m going to do after your security guy lets me through the front door....

Steal Everything, Kill Everyone, Cause Total Financial Ruin

Jayson E. Street, Information Systems security expert and CIO at Stratagem 1 Solutions, describes his real-world intrusion engagements during his Defcon talk to show the flaws of the current security model within enterprises. Hi! This is my talk. I want you to understand I had to start with this slide (see...

From White Hat to Black 5: Darkmarket and Undercover FBI Operation

In the final part of the story, Kevin Poulsen dwells on the undercover FBI operation targeting Max Vision’s carding business, and speaks on where Max’s black hat activities ended up getting him in the long run. What happened next was there was another vulnerability. In fact, his whole career is kind of...

From White Hat to Black 4: ATM Fraud and Point of Sale Hacks

Kevin Poulsen highlights new crime areas Max Vision and his partner got into: ATM fraud based on CVV system vulnerability, restaurant hacks, and running a carder forum of their own. So things changed – I almost forgot this. At the same time that Max was doing this, one of the people that were infected...

From White Hat to Black 3: The Carder Forums

This part of Kevin Poulsen’s talk narrates about a very crafty strategy that Max Vision and his companion Chris Aragon adopted to get hold of stolen credit card data from carder forum users, and monetize it with remarkable efficiency. Chris’ money was running out. So Max did the logical thing and he...

From White Hat to Black 2: The Robin Hood Hacker

Kevin Poulsen now gives an insight about the way Max Vision went distinctly black hat under the pressure of circumstances after completing his jail sentence. The Robin Hood Hacker Getting into Taft turned out to be a very important development, because before – he was kind of a misguided naive white hat,...

From White Hat to Black – The Curious Case of Cybercrime Kingpin Max Vision

Kevin Poulsen, former hacker and currently Senior Editor at Wired.com, gives a captivating talk at RSA Conference on the intricate story of the cyber criminal named Max Ray Vision (Max Butler) who ended up going from white hat to black hat. Thanks for coming, everybody. So, as you’ve heard, I’m a...

Where Are We and Where Are We Going 6: Case Flame

At the end of the keynote, Mikko Hypponen presents his in-depth research into the Flame case, specifying the mechanisms and techniques applied by the virus. I wanted to find some image about flame or fire, or something that would nicely fit into all the talk, and the best image I could find was this....

Where Are We and Where Are We Going 5: Governmental Attacks and Backstage Stuxnet Facts

Shifting the focus of the talk towards governmental attacks, Mikko Hypponen pays particular attention to the situation around Iran, and provides some really interesting facts about the notorious Stuxnet worm. Let’s speak about governmental attacks. Now, like I said in the beginning, it’s quite...