CopenhagenCybercrimeConfrence 2015 June 11, 2015 to June 11, 2015, Copenhagen,Amsterdam

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
ATM Jackpotting in the Wild Thomas Siebert , Marc Ester ATMs, being full of money, are a classical target of criminals. In recent times, attackers ...
Can Encryption Save the World? Peter Landrock There is only one way to protect data: Using cryptographic techniques, be it for authentication, ...
DKCERT – An Academic Computer Security Incident Response Team in the Global CERT- and CSIRT-Network Henrik Larsen DKCERT – the Danish academic Computer Security Incident Response Team – is an organisation within ...
Don’t be an ostrich – be a chipmunk Manuel Vigilius One thing is certain about crises: Sooner or later you will run into one. It ...
How I hacked my Home David Jacoby In the IT-security industry, we are at the moment releasing articles about how hackers and ...
How Website Insecurity Can Ruin Your Business Peter Kruse A large number of corporate websites in Denmark are vulnerable to different types of attacks, ...
Information security - current challenges and perspectives Adam Lebech Information security should be on top of the agenda for CEOs today - not just ...
Operation Potato Express: Analysis of a Cyberespionage Toolkit Robert Lipovsky , Anton Cherepanov The talk uncovers details about an espionage malware family used against targets in numerous countries, ...
Physical [In]Security: It’s not ALL about Cyber Inbar Raz Today's threat landscape is all about Cyber. We have cyber threats, cyber security, cyber warfare, ...
Practical experiences in Outsourcing Kurt Sejr Hansen The presentation will give a short overview of what to consider before, under and after ...
PUA – Potentially Unwanted Advice Righard J. Zwienenberg For a long time now, security experts have advised users to use ad-blockers, pop-up blockers, ...
The Attack of the Killer Tomatoes Gabor Szappanos Malware authors are not shy about borrowing ideas. One of the most typical cases was ...
The Stuxnet-O-Meter: Measuring Complexities Marion Marschalek A few years back the threat detection industry introduced the imaginary line between common mass ...
Waterfall Computing – Creating Value in the Absence of Big Data Paul A. Vixie Buzzword compatible Internet security startups like to talk about their Big Data Stack. But just ...