BSidesCapeTown 2014 June 6, 2014 to June 7, 2014, CapeTown,South Africa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome and introductions Istvan Berko N/A
Insecure out of the box: Leveraging Android manufacturer's mistakes to attack corporate networks Robert Miller We have long known that Android can be affected by malware. Most users are now ...
iOS Penetration Testing for Developers Kyle Riley A walkthrough of the practice of iOS penetration testing will be covered. The basic environment, ...
Hybrid Mobile Applications David Hartley Hybrid mobile applications combine the features of web applications and “native” mobile applications using cross ...
Advanced footprinting techniques using Yeti Johan Snyman Every organisation has an online footprint consisting of the IPs, domains, servers, services and applications ...
Vulnerabilty Management - “who is swimming naked” ? Bernard Coetzee “People, Process, Technology” These are the three components required to complete any project, what is ...
A proposed model for explaining and educating Information and Computer Security principle Hendrik Visage Most of the current Information and Computer Security (ICS) literature and research, appears to be ...