Tag: conference
-
[Video] Blackhat 2010 – Base Jumping: Attacking GSM Base Station Systems and mobile phone Base Bands
Base Jumping: Attacking GSM Base Station Systems and mobile phone Base BandsRecent technological advances have placed GSM tools within the reach of to… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/l-fy6mSN1G4/5353
-
[Video] Blackhat – 2010 More Bugs In More Places: Secure Development On Moble Platforms
More Bugs In More Places: Secure Development On Moble PlatformsNothing succeeds like success, and with the attention garnered by Apple’s App Store, ma… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/nR2ZJmP1yro/5352
-
[Video] Blackhat 2010 – Malware Attribution: Tracking Cyber Spies and Digital Criminals
Malware Attribution: Tracking Cyber Spies and Digital CriminalsCorporate, state, and federal networks are at great risk and a decade of security spend… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/B2i8e2ywANE/5357
-
[Video] Blackhat 2010 – Malware Freak Show 2010: The Client-Side Boogaloo
Malware Freak Show 2010: The Client-Side BoogalooWe had a busy year. We investigated over 200 incidents in 24 different countries. We ended up collect… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/5nhoMx6ciP0/5358
-
[Video] Blackhat 2010 – Exploiting Remote timing attacks
Exploiting timing attacks in widespread systemsMuch has been written about timing attacks since they first appeared over 15 years ago. However, many d… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/Fm_VCljyWv8/5388
-
[Video] Blackhat 2010 – Burning Asgard – An Introduction to the tool loki
I personally remember the release of Yersinia at Black Hat Europe 2005. It was a ground breaking experience: a number of Layer 2 attacks regarded pure… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/ZOM34Ml7eJU/5387
-
[Video] Blackhat 2010 – Extreme-Range RFID
Tags: conferenceIf you think that RFID tags can only be read a few inches away from a reader you haven’t met EPC Gen2, the tag that can be found in Enhanced Drivers L… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/T1Y__JoSk8c/5386
-
[Video] Blackhat 2010 – WPA Migration Mode : WEP is Back to Haunt You….
Cisco access points support WPA migration mode, which enables both WPA and WEP clients to associate to an access point using the same Service Set Iden… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/ZxB8BMEKgWY/5385
-
[Video] Blackhat – 2010 PSUDP: A Passive Approach to Network-Wide Covert Communication
PSUDP: A Passive Approach to Network-Wide Covert CommunicationThis presentation analyzes a novel approach to covert communication over DNS by introduc… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/zJQf3OITOkc/5389
-
[Video] Blackhat 2010 – mod_antimalware: a novel apache module for containing web-based malware
mod_antimalware: a novel apache module for containing web-based malware infectionsDrive-by downloads planted on legitimate sites (e.g., via structural… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/l9P3Ei930WQ/5356
-
[Video] Blackhat 2010 – App Attack
The mobile app revolution is upon us. Applications on your smartphone know more about you than anyone or anything else in the world. Apps know where y… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/WXzPL7LDEHo/5384

