the least constructive guys on the interwebs

Dec 02, 2014
Via: sp0rus

I was successful in hitting all three of my goals lifts on Saturday!<br /><br /><b>Video of the PRs:</b><iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube-nocookie.com/embed/qkQEgD1kfMA" width="560"></iframe><div class="feedflare"> <a href="http://feeds.feedburner.com/~ff/SquaringCircles?a=soCPuSZcoOM:5NPZARAIZe0:qj6IDK7rITs"><img src="http://feeds.feedburner.com/~ff/SquaringCircles?d=qj6IDK7rITs" border="0"></img></a> </div><img src="http://feeds.feedburner.com/~r/SquaringCircles/~4/soCPuSZcoOM" height="1" width="1"/>

link

Dec 02, 2014
Via: sp0rus

I was successful in hitting all three of my goals lifts on Saturday!<br /><br /><b>Video of the PRs:</b><iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube-nocookie.com/embed/qkQEgD1kfMA" width="560"></iframe><div class="feedflare"> <a href="http://feeds.feedburner.com/~ff/SquaringCircles?a=soCPuSZcoOM:5NPZARAIZe0:qj6IDK7rITs"><img src="http://feeds.feedburner.com/~ff/SquaringCircles?d=qj6IDK7rITs" border="0"></img></a> </div><img src="//feeds.feedburner.com/~r/SquaringCircles/~4/soCPuSZcoOM" height="1" width="1" alt=""/>

link

Nov 22, 2014
Via: Irongeek

Link: http://www.irongeek.com/i.php?page=security/derbycon-2014-higher-education-panel-for-hackers
Just my thoughts on the state of infosec education at universities.

link

Nov 22, 2014
Via: Irongeek

Link: http://www.irongeek.com/i.php?page=security/derbycon-2014-higher-education-panel-for-hackers
Just my thoughts on the state of infosec education at universities.

link

Nov 17, 2014
Via: Irongeek

link: http://www.irongeek.com/i.php?page=videos/hack3rcon5/mainlist

Here are the videos from Hack3rcon^5 Enjoy.

Bash Scripting for Penetration Testers
Lee Baird


Intro to PowerShell Scripting for Security

ISLET: An Attempt to Improve Linux-based Software Training
Jon Schipp

Remote Phys Pen: Spooky Action at a Distance
Brian Martin

Introducing Network-Scout: Defending The Soft Center of Your Network

Using the techniques of propaganda to instill a culture of security
Justin Rogosky

Identify Your Web Attack Surface: RAWR!
Tom Moore, Adam Byers

Gone in 60 minutes _ Practical Approach to Hacking an Enterprise with Yasuo
Saurabh Harit, Stephen Hall

Check Your Privilege(s): Futzing with File Shares for low hanging fruit
Adrian Crenshaw

DERP - Dangerous Electronic Redteam Practices
Luis Santana

When Zombies take to the Airwaves

I Am Nation State (And So Can You!)
tothehilt, SynAckPwn

link

Nov 17, 2014
Via: Irongeek

link: http://www.irongeek.com/i.php?page=videos/hack3rcon5/mainlist

Here are the videos from Hack3rcon^5 Enjoy.

Bash Scripting for Penetration Testers
Lee Baird


Intro to PowerShell Scripting for Security

ISLET: An Attempt to Improve Linux-based Software Training
Jon Schipp

Remote Phys Pen: Spooky Action at a Distance
Brian Martin

Introducing Network-Scout: Defending The Soft Center of Your Network

Using the techniques of propaganda to instill a culture of security
Justin Rogosky

Identify Your Web Attack Surface: RAWR!
Tom Moore, Adam Byers

Gone in 60 minutes _ Practical Approach to Hacking an Enterprise with Yasuo
Saurabh Harit, Stephen Hall

Check Your Privilege(s): Futzing with File Shares for low hanging fruit
Adrian Crenshaw

DERP - Dangerous Electronic Redteam Practices
Luis Santana

When Zombies take to the Airwaves

I Am Nation State (And So Can You!)
tothehilt, SynAckPwn

link

Nov 17, 2014
Via: Irongeek

link: http://www.irongeek.com/i.php?page=videos/hack3rcon5/mainlist

Here are the videos from Hack3rcon^5 Enjoy.

Bash Scripting for Penetration Testers
Lee Baird


Intro to PowerShell Scripting for Security

ISLET: An Attempt to Improve Linux-based Software Training
Jon Schipp

Remote Phys Pen: Spooky Action at a Distance
Brian Martin

Introducing Network-Scout: Defending The Soft Center of Your Network

Using the techniques of propaganda to instill a culture of security
Justin Rogosky

Identify Your Web Attack Surface: RAWR!
Tom Moore, Adam Byers

Gone in 60 minutes _ Practical Approach to Hacking an Enterprise with Yasuo
Saurabh Harit, Stephen Hall

Check Your Privilege(s): Futzing with File Shares for low hanging fruit
Adrian Crenshaw

DERP - Dangerous Electronic Redteam Practices
Luis Santana

When Zombies take to the Airwaves

I Am Nation State (And So Can You!)
tothehilt, SynAckPwn

link

Oct 19, 2014
Via: Irongeek

Link:http://www.irongeek.com/i.php?page=videos/grrcon2014/mainlist
These are the videos of the presentations from GrrCON 2014. Big thanks to EggDropX and Jaime for having me out, and my video crew&nbsp; (Chris, Steve, Ian, Justine, and other Chris) for recording.

T-Rex

Around the world in 80 Cons (A tale of perspectives)
Jayson E Street

Infosec in the 21st century
Tim Crothers

Securing our Ethics: Ethics and Privacy in a Target-Rich Environment
Kevin Johnson

Social Engineering Can Kill Me, But It Can’t Make Me Care
Gavin ‘Jac0byterebel’ Ewan

Finding Our Way – From Pwned to Strategy&nbsp;
David Kennedy (Likely lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)

Emulate SandBox and VMs to avoid malware infections
Jordi Vazquez (Likely lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)

Security Hopscotch
Chris Roberts (Likely lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)

Email DLP: Simple concept, often poorly implemented
c0rrup7_R3x (Likely lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)

Look Observe Link (LOL) – How I learned to love OSINT
NinjaSl0th (Half lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)

ZitMo NoM
David “HealWHans” Schwartzberg

Bigger Boys Made Us
Mike Kemp

Full Douchesclosure
Duncan Manuts

Finux’s Historical Tour Of IDS Evasion, Insertions, and Other Odditie
Arron ‘Finux’ Finnon

&nbsp;

Velociraptor

Beating the Infosec Learning Curve Without Burning Out
Scott ‘secureholio’ Thomas

Picking Blackberries
Thomas &#39;G13&#39; Richards

Exercising with Threat Models
J Wolfgang Goerlich

Seeing Purple: Hybrid Security Teams for the Enterprise
B31tf4c3

CryptoRush – Rising from the Ashes
King Dragon

Autonomous Remote Hacking Drones
Dr. Phil Polstra

Proof That Windows Computer Forensics is Sexy
Kyle ‘Chaoticflaws’ Andrus

BioHacking: Becoming the Best Me I Can Be
Leonard

Vulnerable By Design – The Backdoor That Came Through the Front
Matthew ‘mandatory’ Bryant

OAuth2.0 – It’s the Implementation Stupid!!
Tony Miller

Breach Stains
Matt ‘The Streaker’ Johnson

Are you a janitor, or a cleaner?
John ‘geekspeed’ Stauffacher &amp; Matthew ‘Mattrix’ Hoy

PCI and Crypto: The Good, The Bad, and The Frankly Ugly
Robert Former

&nbsp;

Stegosaurus

Advanced Threats and Lateral Movement&nbsp;
Terrance Davis

Adopting a Risk-based Threat Model to Secure Your Defenses and Regain Control of Your Critical Data
Todd Bursch

New World, New Realities: Endpoint threat Detection, Response and Prevention
Brian Orr

Reducing Your Organization’s Social Engineering Attack Surface
Jen Fox

Memory Forensics with Hyper-V Virtual Machines
Wyatt Roersma

$#!T My Industry Says. . .
Kellman Meghu

Bringing PWNED To You: Interesting Honeypot Trends
Elliott Brink

The Security Implications of Software Defined Networks
Shane Praay

Lessons from the front lines: Top focus areas for information security leaders
Shogo Cottrell

How to budget IDS’s
Brian ‘Arcane’ Heitzman

LEVIATHAN: Command and Control Communications on Planet Earth
Kevin Thompson

Red Teaming: Back and Forth, 5ever
FuzzyNop

Intelligence Driven Security
Shane Harsch

Security for the People: End-User Authentication Security on the Internet
Mark Stanislav

Hackers Are People Too
Infosystir

Vaccinating APK’s
Milan Gabor

&nbsp;

Brontosaurus

Hack the Hustle! Career Strategies For Information Security Professionals
Eve Adams

The Challenge of Natural Security Systems
Rockie Brockway

Application Pen Testing
Chris Pfoutz

Advanced Breaches of 2013 vs. Behavioral Detection
Charles Herring

Security On The Cheap
Joel Cardella

Hacking Android
Godfrey Nolan

Cyber Security Incidents: Red Blue Team
Unc13 Fuck3r

Extra

Board Breaking Challenge

GrrCON Talent Accelerator Program
Abe Jones

link

Oct 19, 2014
Via: Irongeek

Link:http://www.irongeek.com/i.php?page=videos/grrcon2014/mainlist
These are the videos of the presentations from GrrCON 2014. Big thanks to EggDropX and Jaime for having me out, and my video crew&nbsp; (Chris, Steve, Ian, Justine, and other Chris) for recording.

T-Rex

Around the world in 80 Cons (A tale of perspectives)
Jayson E Street

Infosec in the 21st century
Tim Crothers

Securing our Ethics: Ethics and Privacy in a Target-Rich Environment
Kevin Johnson

Social Engineering Can Kill Me, But It Can’t Make Me Care
Gavin ‘Jac0byterebel’ Ewan

Finding Our Way – From Pwned to Strategy&nbsp;
David Kennedy (Likely lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)

Emulate SandBox and VMs to avoid malware infections
Jordi Vazquez (Likely lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)

Security Hopscotch
Chris Roberts (Likely lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)

Email DLP: Simple concept, often poorly implemented
c0rrup7_R3x (Likely lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)

Look Observe Link (LOL) – How I learned to love OSINT
NinjaSl0th (Half lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)

ZitMo NoM
David “HealWHans” Schwartzberg

Bigger Boys Made Us
Mike Kemp

Full Douchesclosure
Duncan Manuts

Finux’s Historical Tour Of IDS Evasion, Insertions, and Other Odditie
Arron ‘Finux’ Finnon

&nbsp;

Velociraptor

Beating the Infosec Learning Curve Without Burning Out
Scott ‘secureholio’ Thomas

Picking Blackberries
Thomas &#39;G13&#39; Richards

Exercising with Threat Models
J Wolfgang Goerlich

Seeing Purple: Hybrid Security Teams for the Enterprise
B31tf4c3

CryptoRush – Rising from the Ashes
King Dragon

Autonomous Remote Hacking Drones
Dr. Phil Polstra

Proof That Windows Computer Forensics is Sexy
Kyle ‘Chaoticflaws’ Andrus

BioHacking: Becoming the Best Me I Can Be
Leonard

Vulnerable By Design – The Backdoor That Came Through the Front
Matthew ‘mandatory’ Bryant

OAuth2.0 – It’s the Implementation Stupid!!
Tony Miller

Breach Stains
Matt ‘The Streaker’ Johnson

Are you a janitor, or a cleaner?
John ‘geekspeed’ Stauffacher &amp; Matthew ‘Mattrix’ Hoy

PCI and Crypto: The Good, The Bad, and The Frankly Ugly
Robert Former

&nbsp;

Stegosaurus

Advanced Threats and Lateral Movement&nbsp;
Terrance Davis

Adopting a Risk-based Threat Model to Secure Your Defenses and Regain Control of Your Critical Data
Todd Bursch

New World, New Realities: Endpoint threat Detection, Response and Prevention
Brian Orr

Reducing Your Organization’s Social Engineering Attack Surface
Jen Fox

Memory Forensics with Hyper-V Virtual Machines
Wyatt Roersma

$#!T My Industry Says. . .
Kellman Meghu

Bringing PWNED To You: Interesting Honeypot Trends
Elliott Brink

The Security Implications of Software Defined Networks
Shane Praay

Lessons from the front lines: Top focus areas for information security leaders
Shogo Cottrell

How to budget IDS’s
Brian ‘Arcane’ Heitzman

LEVIATHAN: Command and Control Communications on Planet Earth
Kevin Thompson

Red Teaming: Back and Forth, 5ever
FuzzyNop

Intelligence Driven Security
Shane Harsch

Security for the People: End-User Authentication Security on the Internet
Mark Stanislav

Hackers Are People Too
Infosystir

Vaccinating APK’s
Milan Gabor

&nbsp;

Brontosaurus

Hack the Hustle! Career Strategies For Information Security Professionals
Eve Adams

The Challenge of Natural Security Systems
Rockie Brockway

Application Pen Testing
Chris Pfoutz

Advanced Breaches of 2013 vs. Behavioral Detection
Charles Herring

Security On The Cheap
Joel Cardella

Hacking Android
Godfrey Nolan

Cyber Security Incidents: Red Blue Team
Unc13 Fuck3r

Extra

Board Breaking Challenge

GrrCON Talent Accelerator Program
Abe Jones

link

Sep 13, 2014
Via: Irongeek

Link: http://www.irongeek.com/i.php?page=videos/bsidesaugusta2014/mainlist
These are the videos from the BSides Augusta conference. Thanks to Lawrence Abrams, and all of the BSides Crew for having me out to help record and render the videos and Pentestfail for manning a capture rig.

Intro

Defeating Cognitive Bias and Developing Analytic Technique
Chris Sanders


ICS/SCADA Defense
Chris Sistrunk


Scaling Security Onion to the Enterprise
Mike Reeves


Techniques for Fast Windows Investigations
Tim Crothers


Using Microsoft’s Incident Response Language
Chris Campbell


Is that hardware in your toolkit, or are you just glad you’re keeping up?
Jeff Murri


Pentester++
Chris Truncer


The Adobe Guide to Keyless Decryption
Tim Tomes


App Wrapping: What does that even mean
David Dewey


Adventures in Asymmetric Warfare
Will Schroeder


When Zombies take to the Airwaves
Tim Fowler


Spying on your employees using memory
Jacob Williams


Crazy Sexy Hacking
Mark Baggett

link

Sep 13, 2014
Via: Irongeek

Link: http://www.irongeek.com/i.php?page=videos/bsidesaugusta2014/mainlist
These are the videos from the BSides Augusta conference. Thanks to Lawrence Abrams, and all of the BSides Crew for having me out to help record and render the videos and Pentestfail for manning a capture rig.

Intro

Defeating Cognitive Bias and Developing Analytic Technique
Chris Sanders


ICS/SCADA Defense
Chris Sistrunk


Scaling Security Onion to the Enterprise
Mike Reeves


Techniques for Fast Windows Investigations
Tim Crothers


Using Microsoft’s Incident Response Language
Chris Campbell


Is that hardware in your toolkit, or are you just glad you’re keeping up?
Jeff Murri


Pentester++
Chris Truncer


The Adobe Guide to Keyless Decryption
Tim Tomes


App Wrapping: What does that even mean
David Dewey


Adventures in Asymmetric Warfare
Will Schroeder


When Zombies take to the Airwaves
Tim Fowler


Spying on your employees using memory
Jacob Williams


Crazy Sexy Hacking
Mark Baggett

link

Aug 21, 2014
Via: Irongeek

Link: http://www.irongeek.com/i.php?page=videos/passwordscon2014/mainlist
These are the videos from the Passwordscon 2014 conference. Thanks for having me out to help record and render the videos.

Track 1

How we deciphered millions of users’ encrypted passwords without the decryption keys. - Josh Dustin (Canceled)

Is Pavlovian Password Management The Answer? - Lance James

DoCatsLikeLemon? – Advanced phrase attacks and analysis - Marco Preuß

Tradeoff cryptanalysis of password hashing schemes - Dmitry Khovratovich, Alex Biryukov, Johann Großschädl

Using cryptanalysis to speed-up password cracking - Christian Rechberger

Password Security in the PCI DSS - Jarred White

Defense with 2FA - Steve Thomas

I have the #cat so I make the rules - Yiannis Chrysanthou

Penetrate your OWA - Nate Power

Surprise talk + advisory release - Dominique Bongard

All your SAP P@$$w0ЯdZ belong to us - Dmitry Chastuhin, Alex Polyakov

Target specific automated dictionary generation - Matt Marx

Bitslice DES with LOP3.LUT - Steve Thomas

Net hashes: a review of many network protocols - Robert Graham

Energy-efficient bcrypt cracking - Katja Malvoni

The problem with the real world - Michal Špaček

Password Topology Histogram Wear-Leveling, a.k.a. PathWell - Rick Redman

Beam Me Up Scotty! – Passwords in the Enterprise - Dimitri Fousekis

Track 2

Welcome &amp; Announcements - Jeremi Gosney, Per Thorsheim

Opening Keynote - Julia Angwin

Secure your email – Secure your password - Per Thorsheim

Highlights of CMU’s Recent Work in Preventing Bad Passwords - Sean Segreti, Blase Ur

Password Hashing Competition: the Candidates - Jean-Philippe Aumasson

What Microsoft would like from the Password Hashing Competition - Marsh Ray, Greg Zaverucha

How Forced Password Expiration Affects Password Choice - Bruce K. Marshall

Security for the People: End-User Authentication Security on the Internet - Mark Stanislav

Authentication in the Cloud – Building Service - Dan Cvrcek

How EFF is Making STARTTLS Resistant to Active Attacks - Jacob Hoffman-Andrews, Yan Zhu

Proof of work as an additional factor of authentication - Phillippe Paquet, Jason Nehrboss

The future of mobile authentication is here - Sam Crowther

Password hashing delegation: how to get clients work for you - Thomas Pornin

Throw the User ID Down the Well - Daniel Reich

Password Generators &amp; Extended Character Set Passwords - Stephen Lombardo, William Gray

Encryption and Authentication: Passwords for all reasons. - Jeffrey Goldberg

Enhancing Password Based Key Derivation Techniques - Stephen Lombardo, Nick Parker

Capturing Passwords into the Secure Desktop - Marcio Almeida de Macedo, Bruno Gonçalves de Oliveira

link

Aug 21, 2014
Via: Irongeek

Link: http://www.irongeek.com/i.php?page=videos/passwordscon2014/mainlist
These are the videos from the Passwordscon 2014 conference. Thanks for having me out to help record and render the videos.

Track 1

How we deciphered millions of users’ encrypted passwords without the decryption keys. - Josh Dustin (Canceled)

Is Pavlovian Password Management The Answer? - Lance James

DoCatsLikeLemon? – Advanced phrase attacks and analysis - Marco Preuß

Tradeoff cryptanalysis of password hashing schemes - Dmitry Khovratovich, Alex Biryukov, Johann Großschädl

Using cryptanalysis to speed-up password cracking - Christian Rechberger

Password Security in the PCI DSS - Jarred White

Defense with 2FA - Steve Thomas

I have the #cat so I make the rules - Yiannis Chrysanthou

Penetrate your OWA - Nate Power

Surprise talk + advisory release - Dominique Bongard

All your SAP P@$$w0ЯdZ belong to us - Dmitry Chastuhin, Alex Polyakov

Target specific automated dictionary generation - Matt Marx

Bitslice DES with LOP3.LUT - Steve Thomas

Net hashes: a review of many network protocols - Robert Graham

Energy-efficient bcrypt cracking - Katja Malvoni

The problem with the real world - Michal Špaček

Password Topology Histogram Wear-Leveling, a.k.a. PathWell - Rick Redman

Beam Me Up Scotty! – Passwords in the Enterprise - Dimitri Fousekis

Track 2

Welcome &amp; Announcements - Jeremi Gosney, Per Thorsheim

Opening Keynote - Julia Angwin

Secure your email – Secure your password - Per Thorsheim

Highlights of CMU’s Recent Work in Preventing Bad Passwords - Sean Segreti, Blase Ur

Password Hashing Competition: the Candidates - Jean-Philippe Aumasson

What Microsoft would like from the Password Hashing Competition - Marsh Ray, Greg Zaverucha

How Forced Password Expiration Affects Password Choice - Bruce K. Marshall

Security for the People: End-User Authentication Security on the Internet - Mark Stanislav

Authentication in the Cloud – Building Service - Dan Cvrcek

How EFF is Making STARTTLS Resistant to Active Attacks - Jacob Hoffman-Andrews, Yan Zhu

Proof of work as an additional factor of authentication - Phillippe Paquet, Jason Nehrboss

The future of mobile authentication is here - Sam Crowther

Password hashing delegation: how to get clients work for you - Thomas Pornin

Throw the User ID Down the Well - Daniel Reich

Password Generators &amp; Extended Character Set Passwords - Stephen Lombardo, William Gray

Encryption and Authentication: Passwords for all reasons. - Jeffrey Goldberg

Enhancing Password Based Key Derivation Techniques - Stephen Lombardo, Nick Parker

Capturing Passwords into the Secure Desktop - Marcio Almeida de Macedo, Bruno Gonçalves de Oliveira

link

Aug 20, 2014
Via: Irongeek

Link: http://www.irongeek.com/i.php?page=videos/takedowncon-rocketcity-2014/mainlist

These are the videos from the TakeDownCon Rocket City 2014. Thanks to Devona Valdez and Paul Coggin for having me out to record.

Hacking Industrial Control Systems - Ray Vaughn (Not Recorded)

Dropping Docs on Darknets: How People Got Caught - Adrian Crenshaw

How Networks are Getting Hacked: The Evolution of Network Security - Omar Santos

Building on Device Vulnerabilities: Attack Modes for ICS - Bryan Singer

Survival in an Evolving Threat Landscape - David Hobbs

Practical Side Channel Attacks On Modern Browsers - Angelo Prado

IPv6 Attack tools - Soctt Hogg

Mobile Forensics and Its App Analysis - Dr. Charline Nixon

Keynote – How Not to do Security - Kellman Meghu

Baseball, Apple Pies, and Big Data Security Analytics: Shorten the Kill Chain Window - Aamir Lakani

Hijacking Label Switched Networks in the Cloud - Paul Coggin

Shepherd’s Pi – Herding Sheep with a Raspberry Pi - Timothy Mulligan

Radio Hack Shack – Security Analysis of the Radio Transmission - Paula Januszkiewicz

IT Security Myths - "How you are helping your enemy" - Joe Vest

Splinter the RAT Attack: Creating Custom RATs to Exploit the Network - Solomon Sonja

Policy Defined Segmentation with Metadata - Scott Kirby

Cyber Attack Mitigation - Christopher Elisan

link

Aug 20, 2014
Via: Irongeek

Link: http://www.irongeek.com/i.php?page=videos/takedowncon-rocketcity-2014/mainlist

These are the videos from the TakeDownCon Rocket City 2014. Thanks to Devona Valdez and Paul Coggin for having me out to record.

Hacking Industrial Control Systems - Ray Vaughn (Not Recorded)

Dropping Docs on Darknets: How People Got Caught - Adrian Crenshaw

How Networks are Getting Hacked: The Evolution of Network Security - Omar Santos

Building on Device Vulnerabilities: Attack Modes for ICS - Bryan Singer

Survival in an Evolving Threat Landscape - David Hobbs

Practical Side Channel Attacks On Modern Browsers - Angelo Prado

IPv6 Attack tools - Soctt Hogg

Mobile Forensics and Its App Analysis - Dr. Charline Nixon

Keynote – How Not to do Security - Kellman Meghu

Baseball, Apple Pies, and Big Data Security Analytics: Shorten the Kill Chain Window - Aamir Lakani

Hijacking Label Switched Networks in the Cloud - Paul Coggin

Shepherd’s Pi – Herding Sheep with a Raspberry Pi - Timothy Mulligan

Radio Hack Shack – Security Analysis of the Radio Transmission - Paula Januszkiewicz

IT Security Myths - "How you are helping your enemy" - Joe Vest

Splinter the RAT Attack: Creating Custom RATs to Exploit the Network - Solomon Sonja

Policy Defined Segmentation with Metadata - Scott Kirby

Cyber Attack Mitigation - Christopher Elisan

link

Aug 12, 2014
Via: Irongeek

Defcon Wireless Village 2014 (Defcon 22) Videos
These are the videos from the Defcon Wireless Village 2014 (Defcon 22). Thanks to the Village People for putting on the event, especially Maeltac for recording.

Intro

So ya wanna get into SDR? - Russell Handorf

Pentoo Primer - Village People

802.11ac Evolution: Data rates and Beamforming - Eric Johnson

Practical Foxhunting 101 - SimonJ

Pwn Phone: gg next map - Timothy Mossey

Hacking 802.11 Basics - Benjamin Smith

UAV-Assisted Three-Dimensional Wireless Assessments - Scott Pack &amp; Dale Rowe

Manna from Heaven; Improving the state of wireless rogue AP attacks - Dominic White &amp; Ian de Villiers

ApiMote: a tool for speaking 802.15.4 dialects and frame injection - Ryan Speers &amp; Sergey Bratus

Pineapple Abductions - Craig Young

Choosing your next antenna, types, power, sizes, the truth. - Raul J Plà

Introduction to the Nordic nRF24L01+ - Larry Pesce

Driver-less Wireless Devices - Dominic Spill &amp; Dragorn

Hacking the Wireless World with Software Defined Radio - 2.0 - Balint Seeber

The NSA Playset: Bluetooth Smart Attack Tools - Mike Ryan

PortaPack: Is that a HackRF in your pocket? - Jared Boone

PHYs, MACs, and SDRs - Robert Ghilduta

SDR Tricks with HackRF - Michael Ossmann

SDR Unicorns Panel - Robert Ghilduta &amp; Michael Ossmann &amp; Balint Seeber

Inside The Atheros WiFi Chipset - Adrian Chadd

link

Aug 12, 2014
Via: Irongeek

Defcon Wireless Village 2014 (Defcon 22) Videos
These are the videos from the Defcon Wireless Village 2014 (Defcon 22). Thanks to the Village People for putting on the event, especially Maeltac for recording.

Intro

So ya wanna get into SDR? - Russell Handorf

Pentoo Primer - Village People

802.11ac Evolution: Data rates and Beamforming - Eric Johnson

Practical Foxhunting 101 - SimonJ

Pwn Phone: gg next map - Timothy Mossey

Hacking 802.11 Basics - Benjamin Smith

UAV-Assisted Three-Dimensional Wireless Assessments - Scott Pack &amp; Dale Rowe

Manna from Heaven; Improving the state of wireless rogue AP attacks - Dominic White &amp; Ian de Villiers

ApiMote: a tool for speaking 802.15.4 dialects and frame injection - Ryan Speers &amp; Sergey Bratus

Pineapple Abductions - Craig Young

Choosing your next antenna, types, power, sizes, the truth. - Raul J Plà

Introduction to the Nordic nRF24L01+ - Larry Pesce

Driver-less Wireless Devices - Dominic Spill &amp; Dragorn

Hacking the Wireless World with Software Defined Radio - 2.0 - Balint Seeber

The NSA Playset: Bluetooth Smart Attack Tools - Mike Ryan

PortaPack: Is that a HackRF in your pocket? - Jared Boone

PHYs, MACs, and SDRs - Robert Ghilduta

SDR Tricks with HackRF - Michael Ossmann

SDR Unicorns Panel - Robert Ghilduta &amp; Michael Ossmann &amp; Balint Seeber

Inside The Atheros WiFi Chipset - Adrian Chadd

link

Jul 20, 2014
Via: Irongeek

Link:http://www.irongeek.com/i.php?page=videos/bsidescleveland2014/mainlist
These are the videos from the Bsides Cleveland conference. Thanks to ,&nbsp;&nbsp;&amp; &nbsp;as the video team. Thanks to twuntymcslore &amp; RockieBrockway for being con mom &amp; dad.

Keynote: Destroying Education and Awareness - David Kennedy

Track 1

APT2 – Building a Resiliency Program to Protect Business - Edward McCabe

Threat Models that Exercise your SIEM and Incident Response - J. Wolfgang Goerlich and Nick Jacob

Fun with Dr. Brown - Spencer McIntyre

Malware Evolution &amp; Epidemiology - Adam Hogan

Plunder, Pillage and Print – The art of leverage multifunction printers during penetration testing - Deral Heiland

Seeing Purple: Hybrid Security Teams for the Enterprise - Mark Kikta (Not posted)

Attacking and Defending Full Disk Encryption - Tom Kopchak

Track 2

Phishing Like a Monarch With King Phisher - Brandon Geise and Spencer McIntyre

The importance of threat intel in your information security program - Jamie Murdock

Lockade: Locksport Electronic Games - Adrian Crenshaw

Pentesting Layers 2 and 3 - Kevin Gennuso and Eric Mikulas

Cleveland Locksport - Jeff Moss, Doug Hiwiller, and Damon Ramsey

Hacking Diversity - Gregorie Thomas

PowerShell: cool $h!t - Zach Wojton

Thinking Outside the Bunker: Security as a practice, not a target - Steven Legg

Password Defense: Controls your users won’t hate - Nathaniel Maier

Am I an Imposter? - Warren Kopp

link

Jul 20, 2014
Via: Irongeek

Link:http://www.irongeek.com/i.php?page=videos/bsidescleveland2014/mainlist
These are the videos from the Bsides Cleveland conference. Thanks to ,&nbsp;&nbsp;&amp; &nbsp;as the video team. Thanks to twuntymcslore &amp; RockieBrockway for being con mom &amp; dad.

Keynote: Destroying Education and Awareness - David Kennedy

Track 1

APT2 – Building a Resiliency Program to Protect Business - Edward McCabe

Threat Models that Exercise your SIEM and Incident Response - J. Wolfgang Goerlich and Nick Jacob

Fun with Dr. Brown - Spencer McIntyre

Malware Evolution &amp; Epidemiology - Adam Hogan

Plunder, Pillage and Print – The art of leverage multifunction printers during penetration testing - Deral Heiland

Seeing Purple: Hybrid Security Teams for the Enterprise - Mark Kikta (Not posted)

Attacking and Defending Full Disk Encryption - Tom Kopchak

Track 2

Phishing Like a Monarch With King Phisher - Brandon Geise and Spencer McIntyre

The importance of threat intel in your information security program - Jamie Murdock

Lockade: Locksport Electronic Games - Adrian Crenshaw

Pentesting Layers 2 and 3 - Kevin Gennuso and Eric Mikulas

Cleveland Locksport - Jeff Moss, Doug Hiwiller, and Damon Ramsey

Hacking Diversity - Gregorie Thomas

PowerShell: cool $h!t - Zach Wojton

Thinking Outside the Bunker: Security as a practice, not a target - Steven Legg

Password Defense: Controls your users won’t hate - Nathaniel Maier

Am I an Imposter? - Warren Kopp

link

Jul 13, 2014
Via: Irongeek

OISF 2014 Videos
These are the videos from the OISF Anniversary Event

Introduction

For the Love of God, DEFEND YOUR MOBILE APPS! Part 2 - Jerod Brennen

Destroying Education and Awareness - Dave Kennedy

Lockade: Electronic Games for Locksport - Adrian Crenshaw

Modern Times: Passwords - Tom Webster

Praeda to PraedaSploit: The embedded device data Harvesting tool for the masses - Deral Heiland “Percent_X”

link

Jul 13, 2014
Via: Irongeek

OISF 2014 Videos
These are the videos from the OISF Anniversary Event

Introduction

For the Love of God, DEFEND YOUR MOBILE APPS! Part 2 - Jerod Brennen

Destroying Education and Awareness - Dave Kennedy

Lockade: Electronic Games for Locksport - Adrian Crenshaw

Modern Times: Passwords - Tom Webster

Praeda to PraedaSploit: The embedded device data Harvesting tool for the masses - Deral Heiland “Percent_X”

link

Jun 15, 2014
Via: Irongeek

Circle City Con 2014 Videos

These are the Circle City Con videos. Thanks to the staff for inviting me down to record. Big thanks to Oddjob, Glenn, James, Mike, Nathan, Chris and Branden for helping set up AV and record.

Track1

Conference Opening

Keynote - Beau Woods

Containing Privileged Processes with SELinux and PaX and Attacking Hardened Systems - Parker Schmitt

Whitelist is the New Black - Damian Profancik

Developing a Open Source Threat Intelligence Program - Edward McCabe

Blurred Lines- When Digital Attacks Get Physical - Phil Grimes

Hackers, Attack Anatomy and Security Trends - Ted Harrington

Exploring the Target Exfiltration Malware with Sandbox Tools - Adam Hogan

Day 2

From Grunt to Operator – Tom Gorup

Moving the Industry Forward – The Purple Team - David Kennedy

Software Assurance Marketplace (SWAMP) - Von Welch

OWASP Top 10 of 2013- It’s Still a Thing and We’re Still Not Getting It - Barry Schatz

Tape Loops for Industrial Control Protocols - K. Reid Wightman

OpenAppID- Open Source Next Gen Firewall with Snort - Adam Hogan

Challenge of Natural Security Systems - Rockie Brockway

InfoSec Big Joke – 3rd Party Assessments - Moey (Not recorded)

How to create an attack path threat model - Wolfgang Goerlich

Day 3

Are You a Janitor or a Cleaner - John Stauffacher / Matt Hoy

Ain’t No Half-Steppin’ - Martin Bos

Track 2

Competitive Hacking- why you should capture the flag - Steve Vittitoe

3 Is a Magic Number (or your Reality Check is About to Bounce) - Edward McCabe

The TrueCrypt audit- How it happened and what we found - Kenneth White

Seeing Purple- Hybrid Security Teams for the Enterprise - Mark Kikta (Beltface)

Eyes on IZON- Surveilling IP Camera Security - Mark Stanislav

Cognitive Bias and Critical Thinking in Open Source Intelligence (OSINT) - Benjamin Brown

Day 2

Hackers Are People Too - Amanda Berlin

gitDigger- Creating useful wordlists and hashes from GitHub repositories - Jaime Filson

Retrocomputing And You – Machines that made the ‘net - Pete Friedman

Doge Safes- Very Electronic, Much Fail, WOW! - Jeff Popio

Human Trafficking in the Digital Age - Chris Jenks

Keys That Go *Bump* In The Night - Loak

How Hackers for Charity (Possibly) Saved Me a LOT of Money - Branden Miller &amp; Emily Miller

Ten Commandments of Incident Response (For Hackers) - Lesley Carhart

Threat Modeling- Fear, Fun, and Operational - James Robinson

Decrypting Communication- Getting Your Point Across to the Masses - Katherine Cook Frye

How often should you perform a Penetration Test - Jason Samide

Proactive Defense – Eliminating the Low Hanging Fruit - Matt Kelly

Active Directory- Real Defense for Domain Admins - Jason Lang

Day 3

Profiling Campus Crime - Chris J., Jason J., Katelyn C.,Alex H.

Proper Seasoning Improves Taste - James Siegel

Executive Management Manaing the Executives Beau Woods &amp; Engaging the Media API Steve Ragan

link

Jun 15, 2014
Via: Irongeek

Link http://www.irongeek.com/i.php?page=videos/circlecitycon2014/mainlis

These are the Circle City Con videos. Thanks to the staff for inviting me down to record. Big thanks to Oddjob, Glenn, James, Mike, Nathan, Chris and Branden for helping set up AV and record.

Track1

Conference Opening

Keynote - Beau Woods

Containing Privileged Processes with SELinux and PaX and Attacking Hardened Systems - Parker Schmitt

Whitelist is the New Black - Damian Profancik

Developing a Open Source Threat Intelligence Program - Edward McCabe

Blurred Lines- When Digital Attacks Get Physical - Phil Grimes

Hackers, Attack Anatomy and Security Trends - Ted Harrington

Exploring the Target Exfiltration Malware with Sandbox Tools - Adam Hogan

Day 2

From Grunt to Operator – Tom Gorup

Moving the Industry Forward – The Purple Team - David Kennedy

Software Assurance Marketplace (SWAMP) - Von Welch

OWASP Top 10 of 2013- It’s Still a Thing and We’re Still Not Getting It - Barry Schatz

Tape Loops for Industrial Control Protocols - K. Reid Wightman

OpenAppID- Open Source Next Gen Firewall with Snort - Adam Hogan

Challenge of Natural Security Systems - Rockie Brockway

InfoSec Big Joke – 3rd Party Assessments - Moey (Not recorded)

How to create an attack path threat model - Wolfgang Goerlich

Day 3

Are You a Janitor or a Cleaner - John Stauffacher / Matt Hoy

Ain’t No Half-Steppin’ - Martin Bos

Track 2

Competitive Hacking- why you should capture the flag - Steve Vittitoe

3 Is a Magic Number (or your Reality Check is About to Bounce) - Edward McCabe

The TrueCrypt audit- How it happened and what we found - Kenneth White

Seeing Purple- Hybrid Security Teams for the Enterprise - Mark Kikta (Beltface)

Eyes on IZON- Surveilling IP Camera Security - Mark Stanislav

Cognitive Bias and Critical Thinking in Open Source Intelligence (OSINT) - Benjamin Brown

Day 2

Hackers Are People Too - Amanda Berlin

gitDigger- Creating useful wordlists and hashes from GitHub repositories - Jaime Filson

Retrocomputing And You – Machines that made the ‘net - Pete Friedman

Doge Safes- Very Electronic, Much Fail, WOW! - Jeff Popio

Human Trafficking in the Digital Age - Chris Jenks

Keys That Go *Bump* In The Night - Loak

How Hackers for Charity (Possibly) Saved Me a LOT of Money - Branden Miller &amp; Emily Miller

Ten Commandments of Incident Response (For Hackers) - Lesley Carhart

Threat Modeling- Fear, Fun, and Operational - James Robinson

Decrypting Communication- Getting Your Point Across to the Masses - Katherine Cook Frye

How often should you perform a Penetration Test - Jason Samide

Proactive Defense – Eliminating the Low Hanging Fruit - Matt Kelly

Active Directory- Real Defense for Domain Admins - Jason Lang

Day 3

Profiling Campus Crime - Chris J., Jason J., Katelyn C.,Alex H.

Proper Seasoning Improves Taste - James Siegel

Executive Management Manaing the Executives Beau Woods &amp; Engaging the Media API Steve Ragan

link

May 27, 2014
Via: Daily Duino

Anxiety, anxiety, tension, disappointment, reduction of sleep – are these the phrases that spring to your mind when you believe of home shifting? No matter whether intercity or intra city, shifting base from one house to yet another is generally a nerve racking job. If you are moving within cities, it is even now greater […]

link

May 23, 2014
Via: Daily Duino

Industrials finished reasonably flat for the year returning a mere one per cent. Gainers for the 12 months have been Agriculture, Telecommunications and Transport growing 15 per cent, 24 per cent and 24 per cent respectively therefore outperforming both the NSE-20 index and NSE All-share index which both fell by seven per cent. Losers for […]

link

May 22, 2014
Via: Daily Duino

If it is a machine then it has to decay with the passage of time and exact same is correct of the car as nicely. No subject which product or engine of the car you chose, soon after a handful of a long time you have to substitute the aged car. Get rid of your […]

link

May 15, 2014
Via: Daily Duino

These days, you truly require to make certain that your organization info is kept secure. Considering the latest news about Apple getting to be susceptible, as well as a bunch of new viruses and hacks that are attacking Android, you will recognize why. Nothing at all is truly safe, honestly. You know that you have […]

link

May 14, 2014
Via: Daily Duino

Number ten. Tomasz Adamek v. Steve Cunningham. Adamek’s split determination victory above Cunningham in December additional a little bit of drama to what could well be the weakest division in boxing. They need to battle 1 a lot more time and then think about relocating up to the 2nd weakest division in boxing, heavyweight. Mexico […]

link

May 14, 2014
Via: Daily Duino

So much force has been put onto the shoulders of the Internet currently. 1 has to maintain in thoughts that this is a pretty new “industry”. It was in no way developed for the sole function of making cash – permit by yourself, masses of cash. It is far from being the “get wealthy fast” […]

link

May 14, 2014
Via: Daily Duino

Most of us commence out with sparkly white tooth. Tooth whitening is the furthest issue from our minds. In reality tooth whitening could not even have existed when we were expanding up. But tiny by small our enamel turned dingy looking. Nonetheless, the procedure was so gradual we weren’t even conscious it was going on. […]

link

May 14, 2014
Via: Daily Duino

Possums are fairly tough to deal with. If ever you occur to encounter 1 near your residence or at your home, this should be a dilemma. Possums are recognized to be noisy, scandalous and really unsanitary. When they fight or when they are with a mate, they surely disturb your rest. At nights when they […]

link

May 11, 2014
Via: Irongeek

Link: http://www.irongeek.com/i.php?page=videos/nmap-class-hfc-louisville-issa
This is the Nmap class the Kentuckiana ISSA put on to support Hackers For Charity. Speakers include Jeremy Druin @webpwnized, Martin Bos @purehate_ and me @irongeek_adc. If you like the videos, please consider donating to Hackers For Charity.

link

May 11, 2014
Via: Irongeek

Link: http://www.irongeek.com/i.php?page=videos/nmap-class-hfc-louisville-issa
This is the Nmap class the Kentuckiana ISSA put on to support Hackers For Charity. Speakers include Jeremy Druin @webpwnized, Martin Bos @purehate_ and me @irongeek_adc. If you like the videos, please consider donating to Hackers For Charity.

link

May 07, 2014
Via: Irongeek

Link: http://www.irongeek.com/i.php?page=videos/showmecon2014/mainlist
These are the videos ShowMeCon 2014. Thanks to Renee &amp; Dave Chronister (@bagomojo), Ben Miller (@Securithid) and others for having me out to record and speak. Also thanks to my video crew Josh Tepen, Robert Young, Kali Baker, Andrew Metzger &amp; Brian Wahoff.

Introduction - Parameter
Hacking Hollywood - Ralph Echemendia
Give Me Your Data - Dave Chronister
Terminal Cornucopia: Demystifying The Mullet - Evan Booth
Thinking Outside The (Sand)Box - Kyle Adams
Protecting The Seams: Military Doctrine Applied To Application And Network Security - Paul Vencill
Start With The BPT Then Worry About The APT! - Kevin Cardwel
Introduction - Parameter (Rolled in with next talk)
Cognitive Injection - Andy Ellis
Inside The World’S Most Dangerous Search Engine - John Matherly
Hacking To Get Caught: A Concept For Adversary Replication And Penetration Testing - Raphael Mudge
Power-Ups And Princesses: What Video Games Taught Me About Building A Security Awareness Program - Aamir Lakhani
Powershell And You: Using Microsoft’S Post-Exploitation Language - Chris Campbell
Dropping Docs On Darknets: How People Got Caught - Adrian Crenshaw
Around The World In 80 Cons - Jayson E Street (not recorded)
Threat Modeling In The C-Suite, A Practical Guide - Erick Rudiak (pending review)
The Call Of Community: Modern Warfare - Ben0xa&nbsp;
Physical (In)Security – It’S Not All About Cyber - Inbar Raz
Bending And Twisting Networks - Paul Coggin
Here, Let Me Hold That For You. Consumer Metadata And Its Dangers - Robert Reed

link

May 07, 2014
Via: Irongeek

Link: http://www.irongeek.com/i.php?page=videos/showmecon2014/mainlist
These are the videos ShowMeCon 2014. Thanks to Renee &amp; Dave Chronister (@bagomojo), Ben Miller (@Securithid) and others for having me out to record and speak. Also thanks to my video crew Josh Tepen, Robert Young, Kali Baker, Andrew Metzger &amp; Brian Wahoff.

Introduction - Parameter
Hacking Hollywood - Ralph Echemendia
Give Me Your Data - Dave Chronister
Terminal Cornucopia: Demystifying The Mullet - Evan Booth
Thinking Outside The (Sand)Box - Kyle Adams
Protecting The Seams: Military Doctrine Applied To Application And Network Security - Paul Vencill
Start With The BPT Then Worry About The APT! - Kevin Cardwel
Introduction - Parameter (Rolled in with next talk)
Cognitive Injection - Andy Ellis
Inside The World’S Most Dangerous Search Engine - John Matherly
Hacking To Get Caught: A Concept For Adversary Replication And Penetration Testing - Raphael Mudge
Power-Ups And Princesses: What Video Games Taught Me About Building A Security Awareness Program - Aamir Lakhani
Powershell And You: Using Microsoft’S Post-Exploitation Language - Chris Campbell
Dropping Docs On Darknets: How People Got Caught - Adrian Crenshaw
Around The World In 80 Cons - Jayson E Street (not recorded)
Threat Modeling In The C-Suite, A Practical Guide - Erick Rudiak (pending review)
The Call Of Community: Modern Warfare - Ben0xa&nbsp;
Physical (In)Security – It’S Not All About Cyber - Inbar Raz
Bending And Twisting Networks - Paul Coggin
Here, Let Me Hold That For You. Consumer Metadata And Its Dangers - Robert Reed

link

Apr 13, 2014
Via: Know the Network

I’ve read a lot about Heartbleed lately but I don’t really understand it. What does it mean for my family? A friend texted me this question yesterday and I’m going to do my best to answer this question in non-tech talk because I feel like the message to normal folk is getting lost in technical […]

link

Apr 13, 2014
Via: Know the Network

I’ve read a lot about Heartbleed lately but I don’t really understand it. What does it mean for my family? A friend texted me this question yesterday and I’m going to do my best to answer this question in non-tech talk because I feel like the message to normal folk is getting lost in technical […]

link

Apr 13, 2014
Via: Irongeek

Link: http://www.irongeek.com/i.php?page=videos/notacon11/mainlist
These are the videos from the 11th Notacon conference held April 10th-13st, 2014. Not all of them are security related, but&nbsp; I hope my viewers will enjoy them anyway. Thanks to Froggy and Tyger for having me up, and to the video team: Securi-D, Ross, KP, Jeff and myself (Let me know who else to add).

Track 1

Big Data Technology – The Real World ‘Minority Report’ - Brian Foster

Naisho DeNusumu (Stealing Secretly) – Exfiltration Tool/Framework - Adam Crompton

Wireless Mesh Protocols - Alex Kot

MDM is gone, MAM is come. New Challenges on mobile security - Yury Chemerkin

Moving the Industry Forward – The Purple Team - David Kennedy

Pwning the POS! - Mick Douglas

Nindroid: Pentesting Apps for your Android device - Michael Palumbo

Building a private data storage cloud - Michael Meffie

Lessons Learned Implementing SDLC – and How To Do It Better - Sarah Clarke

Plunder, Pillage and Print - Deral Heiland &amp; Peter Arzamendi

Microsoft Vulnerability Research: How to be a finder as a vendor - Jeremy Brown &amp; David Seidman

SMalware Analysis 101 – N00b to Ninja in 60 Minutes - grecs

Omega – A Universe Over IP - Mo Morsi

IRS, Identity Theft, and You (or Someone Pretending to Be You). - 123-45-6789

Track 2

All About the Notacon Badge -Sam Harmon

Collaboration between Artificial Intelligence and Humans: How to cure every disease within 50 years - Joe O’Donnell

Science “Fair” - The Nomad Clan

Hacking Your Way Into the APRS Network on the Cheap - Mark Lenigan

Dominate! (Or let your computer do it for you.) - Paul Jarc

Wearable Technology as Art for Countersurveillance, Cinemaveillance, and Sousveillance - Ross Bochnek

3D Printing for Work and Fun (temp title) - Mirabela Rusu

Comparing “Go Green” With “Common Sense” - Suellen Walker

Living in the Future: It seems to be in Beta - Jeff Goeke-Smith

A Brief Introduction to Game Theory - Charlotte DeKoning - Beyond Using The Buddy System - Holly Moyseenko &amp; Kris Perch

link

Apr 13, 2014
Via: Irongeek

Link: http://www.irongeek.com/i.php?page=videos/notacon11/mainlist
These are the videos from the 11th Notacon conference held April 10th-13st, 2014. Not all of them are security related, but&nbsp; I hope my viewers will enjoy them anyway. Thanks to Froggy and Tyger for having me up, and to the video team: Securi-D, Ross, KP, Jeff and myself (Let me know who else to add).

Track 1

Big Data Technology – The Real World ‘Minority Report’ - Brian Foster

Naisho DeNusumu (Stealing Secretly) – Exfiltration Tool/Framework - Adam Crompton

Wireless Mesh Protocols - Alex Kot

MDM is gone, MAM is come. New Challenges on mobile security - Yury Chemerkin

Moving the Industry Forward – The Purple Team - David Kennedy

Pwning the POS! - Mick Douglas

Nindroid: Pentesting Apps for your Android device - Michael Palumbo

Building a private data storage cloud - Michael Meffie

Lessons Learned Implementing SDLC – and How To Do It Better - Sarah Clarke

Plunder, Pillage and Print - Deral Heiland &amp; Peter Arzamendi

Microsoft Vulnerability Research: How to be a finder as a vendor - Jeremy Brown &amp; David Seidman

SMalware Analysis 101 – N00b to Ninja in 60 Minutes - grecs

Omega – A Universe Over IP - Mo Morsi

IRS, Identity Theft, and You (or Someone Pretending to Be You). - 123-45-6789

Track 2

All About the Notacon Badge -Sam Harmon

Collaboration between Artificial Intelligence and Humans: How to cure every disease within 50 years - Joe O’Donnell

Science “Fair” - The Nomad Clan

Hacking Your Way Into the APRS Network on the Cheap - Mark Lenigan

Dominate! (Or let your computer do it for you.) - Paul Jarc

Wearable Technology as Art for Countersurveillance, Cinemaveillance, and Sousveillance - Ross Bochnek

3D Printing for Work and Fun (temp title) - Mirabela Rusu

Comparing “Go Green” With “Common Sense” - Suellen Walker

Living in the Future: It seems to be in Beta - Jeff Goeke-Smith

A Brief Introduction to Game Theory - Charlotte DeKoning - Beyond Using The Buddy System - Holly Moyseenko &amp; Kris Perch

link

Apr 09, 2014
Via: Know the Network

heartbleed_sad_browsersThere is a very nasty vulnerability known as Heartbleed that has been discovered withing OpenSSL. While you may not be familiar with OpenSSL you are familiar with the hundreds of thousands of sites that use it to protect your passwords and encrypt your data. It is estimated to be implemented on a 1/3 of all […]

link