Datos robados o perdidos en 2013

Explore more infographics like this one on the web's largest information design community - Visually.
Leer más

Material de la Zero Nights 2013

Disponible el material de las presentaciones dadas en la conferencia rusa Zero Nights 2013: Endpoint security via application sandboxing and virtualization — past, present, future State of Crypto Affairs Practical exploitation of rounding vulnerabilities in internet banking applications The Machines that Betrayed their Masters Virtually Impossible: The Reality Of Virtualization Security DbiFuzz framework Windows Kernel Trap Handler and NTVDM Vulnerabilities — Case Study IP fragmentation attack on DNS HART (in)security Exploitation of AVR & MSP microchips Filesystem timing attacks practice Strike to the infrastructure: a story about analyzing thousands mobile apps SCADA deep inside: protocols, security mechanisms, software architecture Anatomy and metrology of DoS/DDoS TOPGUN multi terabit DPI Timing analysis An introduction to the use SMT solvers for software security BlackBox analysis of iOS apps Hacking HTML5 Physical (In)Security — it’s not –ALL– about Cyber Advanced exploitation of Android Master Key Vulnerability (bug 8219321) HexRaysCodeXplorer: make object-oriented RE easier Practical application of math methods and image recognition in attack detection.
Leer más

Presentaciones de Ruxcon 2013

Ya tenemos disponibles las presentaciones (diapositivas) de Ruxcon 2103, conferencia sobre seguridad informática celebrada anualmente en Melbourne, Australia. Amateur Satellite Intelligence: Watching North Korea Payment Applications Handle Lots of Money. No, Really: Lots Of It. Visualization For Reverse Engineering and Forensics Electronic Voting Security, Privacy and Verifiability Cracking and Analyzing Apple iCloud Protocols: iCloud Backups, Find My iPhone, Document Storage Buried by time, dust and BeEF Under the Hood Of Your Password Generator Malware, Sandboxing and You: How Enterprise Malware and 0day Detection is About To Fail (Again) VoIP Wars: Return of the SIP BIOS Chronomancy: Fixing the Static Root of Trust for Measurement The BYOD PEAP Show: Mobile Devices Bare Auth Bypassing Content-Security-Policy Deus Ex Concolica - Explorations in end-to-end automated binary exploitation Top of the Pops: How to top the charts with zero melodic talent and a few friendly computers AntiTraintDroid - Escaping Taint Analysis on Android for Fun and Profit Introspy : Security Profiling for Blackbox iOS and Android Inside Story Of Internet Banking: Reversing The Secrets Of Banking Malware Edward Snowden: It's Complicated Roll the Dice and Take Your Chances Cracking, CUDA and the Cloud – Cracking Passwords Has Never Been So Simple, Fast and Cheap
Leer más

Vídeos de la LinuxCon North America 2013

Desde el canal de Youtube de la Linux Foundation, ya podemos ver todos los vídeos de las charlas de la LinuxCon 2013 celebrada en Nueva Orleans el pasado mes de septiembre. Aquí tenéis la lista: Integrated Trace_ Using Virtio-Trace for a Virtualization Environment - Yoshihiro Yunomae, Hitachi Collab. GPL Compliance Through Non-Profit Entities - Bradley M. Kuhn, Software Freedom Conservancy Raspberry Pi: Getting Started and Creative Applications - Ruth Suehle, Red Hat Storage: Pulling Together Management Across the Cloud and Bare Metal - Ric Wheeler, Red Hat Stop Touching My Kernel Code!
Leer más

Vídeos de la BruCON 0x05 (2013)

Otra serie de vídeos sobre seguridad informática. Estos son de la edición 2013 de BruCON 0x05. Devops Panel (part 2) Lightning Talks Session #1 David Mortman's Keynote David Perez, Jose Pico - Geolocation of GSM mobile devices Russ Gideon - Paint by Numbers vs. Monet Robert Graham - Data-plane networking Dan Guido's Keynote Stephan Chenette - Building Custom Android Malware for Penetration Testing Jake Valletta - CobraDroid TB. Henriques, T.
Leer más

Vídeos de la Sigint13

Sigint es una conferencia de 3 días celebrada anualmente dónde se tratan aspectos técnicos y sociales de la actual era digital, organizada por el Chaos Computer Club. Este año se celebró entre los días 5 y 7 de julio. Aquí tenéis la lista de los vídeos de dicha conferencia: Automatisierte Videoüberwachung Parabolic Plane Flights – Research.. Cryptocat: The Social and Technical .. Ruby is Magic! Car immobilizer hacking UI Redressing Attacks on Android Dev.
Leer más

Presentaciones de la Hack in Paris 2013

Se han publicado la mayoría de las presentaciones dadas en la Hack in Paris 2013 celebrada del 17 al 21 de junio. La lista es la siguiente: Remoting android applications for fun and profit Windows Phone 8 application security I'm in your browser, pwning your stuff - Attacking Google Chrome extensions Origin policy enforcement in modern browsers Web Applications Forensics DBI Frameworks applied to computer security : Uses and comparative The Realex payments application security story, narrated by Security Ninja The Control of technology by nation state : Past, Present and Future - The Case of Cryptology and information security Burp Pro : Real-life tips and tricks Malware vs Virtualization : The endless cat and mouse play Next generation rootkits for ARM based devices The inner HTML Apocalypse : How MXSS attacks change everything we believed to know so far
Leer más

Presentaciones de la HITBSECCONF 2013 - Amsterdam

Ya tenemos entretenimiento para el fin de semana con las presentaciones de la conferencia sobre seguridad informática de la Hack In The Box 2013 celebrada en Amsterdam. CLOSING KEYNOTE - Winn Schwartau - The History of the Future of InfoSec.pdf D1 KEYNOTE - Edward Schwartz - Embracing the Uncertainty of Advanced Attacks with Big Data Analytics.pdf D1LAB - Didier Stevens - Windows x64 Essentials.pdf D1LAB - Itzik Kotler - Hack Like It's 2013.
Leer más

Presentaciones de la Rooted CON 2013

Ya tenemos disponibles las presentaciones de la Rooted CON 2013, uno de los congresos sobre seguridad informática de referencia de la scene española. Aquí tenéis el listado de las presentaciones: Juan A. Calles y Pablo González - Metasploit & Flu-AD: Avoiding AVs with Payloads/DLLs Injection Roberto Baratta - eFraude: ganar gestionando la derrota Vicente Díaz - Birds, bots and machines - Fraud in Twitter and how to detect it using MLT Albert López - Linux Heap Exploiting Revisited Joxean Koret - Interactive Static Analysis Tools for Vulnerability Discovery Jesús Olmos - ChromeHack, a html5/chrome webhack tool David Meléndez Cano - Trash Robotic Router Platform (TRRP) Antonio Ramos - ¿Y si la seguridad afectara al valor contable de la empresa?
Leer más

Presentaciones de CanSecWest Vancouver 2013

Pues como dice el título, ya están disponibles para descarga las presentaciones (diapositivas) de CanSecWest Vancouver 2013: Keynote iOS6.1 - Exploitation 280 Days Later Evil Maid Just Got Angrier: Why Full-Disk Encryption With TPM is Insecure on Many Systems Sandbox Escapes: When the Broker is Broken Reflecting on Reflection - Exploiting Reflection Vulnerabilities in Managed Languages An Android Hacker's Journey: Challenges in Android Security Research DEP/ASLR bypass without ROP/JIT SMS to Meterpreter - Fuzzing USB Modems Cracking and Analyzing Apple iCloud backups, Find My iPhone, Document Storage.
Leer más