Del 20 al 22 de octubre tuvo lugar en Luxemburgo la 11ª edición de la Hack.lu una convención/conferencia donde se habla sobre seguridad informática, privacidad, tecnologías de la información y su implicación cultural y tecnológica en la seguridad.
Viendo algunas presentaciones las charlas debieron ser impresionantes. Podéis disfrutar ya de la mayoría del material (iré subiendo el resto de enlaces según vayan publicando):
- Unpatchable: Living with a Vulnerable Implanted Device
- Internet of Tchotchke
- Trusting Files Formats: Illusions or Reality?
- How Mobile Applications Are Redefining Information Controls Inside of Iran
- Geek usages for your Fitbit Flex tracker
- Key-Logger, Video, Mouse - How to turn your KVM into a raging key-logging monster
- Forging the USB armory
- Keys? Where we’re going, we don’t need keys
- Draw me a Local Kernel Debugger
- Security of Virtual Desktop Infrastructures: from great concepts to bad surprises
- Binary Constraint Solving with LLVM
- Advances in Secure Messaging Protocols
- Learn from Malwares, A Practical guide of spear phishing for Red Teams
- How not to build an electronic voting system
- Totally Spies!
- HackingTeam - how they infected your Android device by 0days
- A Collective View of Current Trends in Criminal Hosting Infrastructures
- How digital forensics met threat intelligence
- They Hate Us ‘Cause They Ain’t Us - How We Broke the Internet
- Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers
- Security Design and High-Risk Users
- Stegosploit - Delivering Drive-By Exploits With Only Images
- Crema: A LangSec-Inspired Programming Language
- Why Johnny Can’t Unpack: Toward One Click Unpacking
- Breaking Yet Another Digital Divide: Bringing the Tech World into the Discussion on Digital Literacy
- Improving Flash Exploits Analysis
- Crowdsourced Malware Triage! (workshop)
Fuente: http://2015.hack.lu/
Viendo algunas presentaciones las charlas debieron ser impresionantes. Podéis disfrutar ya de la mayoría del material (iré subiendo el resto de enlaces según vayan publicando):
- Unpatchable: Living with a Vulnerable Implanted Device
- Internet of Tchotchke
- Trusting Files Formats: Illusions or Reality?
- How Mobile Applications Are Redefining Information Controls Inside of Iran
- Geek usages for your Fitbit Flex tracker
- Key-Logger, Video, Mouse - How to turn your KVM into a raging key-logging monster
- Forging the USB armory
- Keys? Where we’re going, we don’t need keys
- Draw me a Local Kernel Debugger
- Security of Virtual Desktop Infrastructures: from great concepts to bad surprises
- Binary Constraint Solving with LLVM
- Advances in Secure Messaging Protocols
- Learn from Malwares, A Practical guide of spear phishing for Red Teams
- How not to build an electronic voting system
- Totally Spies!
- HackingTeam - how they infected your Android device by 0days
- A Collective View of Current Trends in Criminal Hosting Infrastructures
- How digital forensics met threat intelligence
- They Hate Us ‘Cause They Ain’t Us - How We Broke the Internet
- Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers
- Security Design and High-Risk Users
- Stegosploit - Delivering Drive-By Exploits With Only Images
- Crema: A LangSec-Inspired Programming Language
- Why Johnny Can’t Unpack: Toward One Click Unpacking
- Breaking Yet Another Digital Divide: Bringing the Tech World into the Discussion on Digital Literacy
- Improving Flash Exploits Analysis
- Crowdsourced Malware Triage! (workshop)
Fuente: http://2015.hack.lu/
Comentarios
Publicar un comentario