AppSecIsrael 2014 Sept. 2, 2014 to Sept. 2, 2014, herzliya,israel

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The (In)Security of AngularJS and MongoDB Israel Chorzevski AngularJS and MongoDB are new technologies which are becoming common in more and more websites. ...
Mobile Security Attacks: A Glimpse From the Trenches Adi Sharabani , Yair Amit Hackers today apply covert and persistent techniques to attack mobile devices. Attend this presentation to ...
Manipulating the Manipulator: Destroying browser-based memory corruption exploits Tomer Teller Browser exploitation is the leading cause for the spread of malware across the web. As ...
Dynamic Analysis of Android Apps: Attacking Apps From The Inside Erez Metula Dynamic analysis of android apps is all about analyzing apps in real time, for the ...
Practical Attacks against MDM Solutions Shai Yanovski Mobile Remote Access Trojans (mRATs) are surveillance tools surreptitiously planted on a user’s handheld device. ...
The Bank Job - Mobile Edition. Remote Exploitation of the Cordova Framework for Android Roee Hay , David Kaplan Apache Cordova is a popular cross-platform framework for mobile development. In this talk we present ...
Getting New Actionable Insights by Analyzing WAF Triggers Or Katz In this presentation I will show an advanced technique for post processing of ModSecurity Core ...
Passwords, Rehashed All Over Again Avi Douglen Passwords suck. It’s no secret – passwords are boring, passwords are weak, passwords are STOOPID. ...
Warning Ahead: Security Storms are Brewing in Your JavaScript Maty Siman JavaScript controls our lives – we use it to zoom in and out of a ...
A Journey To Protect Points-of-Sale Nir Valtman Many point-of-sale breaches occurred in the past year and many organizations are still vulnerable against ...
InfoSec Natural Selection - Measuring the VALUE of Security Products Shay Chen It should have been easier to make intelligent choices in 2014, deciding what's right and ...
My Preciousss… Holding on to Your Sensitive Data Ofer Maor Everybody's spending a lot of energy on application security, and yet every once and then ...
Opening Keynote: Steering a Battleship to a Secure Path – Bringing the product security message to HP Software Tomer Gershoni Can we actually make a security mindset change in an enterprise company where business comes ...