Monthly Archives: October 2012
Pwned by the Owner: What Happens When You Steal a Hacker’s Computer
Dr. Andrew Zoz Brooks, a well-known computer expert and co-host in 'Prototype This!' TV series, shares his hilarious computer theft story with Defcon...
Data Mining a Mountain of Zero Day Vulnerabilities
Black Hat Europe 2012 conference guest Chris Wysopal, the CTO and Co-founder of Veracode, presents his research on the different sorts of prevalent...
Bypassing the Android Permission Model
Georgia Weidman, the Founder and CEO of Bulb Security, takes the floor at HITBSecConf2012 Amsterdam to present her research on security details and flaws...
Drinking From the Caffeine Firehose We Know as Shodan
Freelance pentest guy Dan Tentler, aka Viss, delivers a talk at Defcon 20 about different digital control and supervision systems that can be accessed...
Watch out for new Skype virus – Worm.NgrBot (Dorkbot)!
Skype faced a wave of SPAM that spreads a dangerous Trojan called Worm.NgrBot (variant of the Dorkbot). Leading antivirus vendors Kaspersky Lab and Doctor...
McAfee Internet Security 2015 review
There aren’t many security companies out there that can proudly boast the experience, reputation and history as solid as McAfee’s. Founded back in 1987,...
Steal Everything, Kill Everyone, Cause Total Financial Ruin
Jayson E. Street, Information Systems security expert and CIO at Stratagem 1 Solutions, describes his real-world intrusion engagements during his Defcon talk to show...