SecT 2017 Sept. 14, 2017 to Sept. 15, 2017, stockholm,sweden

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Intercepting iCloud Keychain Alex Radocea iCloud Keychain employs end-to-end encryption to synchronise secrets across devices enrolled in iCloud. We discovered ...
Candy and Competence Hugo Hirsh Bringing together lessons from Criminology, Sociology and Behavioral Psychology, this talk focuses on the human ...
Hack the Invisible! Exploiting IoT Devices over Software Defined Radio, ZigBee, WiFi and BLE Swaroop Yermalkar With arrival of new smart devices every day, Internet of Things is one of the ...
Act Three, The Evolution of Privacy Arron "finux" Finnon ZOMG not another god-damn privacy talk, i’m fed up of this. When will it ever ...
Where Cypherpunk Meets Organized Crime Benjamin Brown Where Cypherpunk Meets Organized Crime: The Shifting Landscape of Underground Economies and Crypto-driven Privacy.
Revoke-Obfuscation Daniel Bohannon Attackers, administrators and many legitimate products rely on PowerShell for their core functionality. However, its ...
Invoke-CradleCrafter Daniel Bohannon Are you a Blue Teamer that feels confident in your ability to detect PowerShell remote ...
Cyber Terrorism Kyle Wilhoit Terrorists have found novel ways to circumvent typical security controls. Examples of these activities come ...
Using the ISCSI Protocol to Harvest Unprotected Hard Drives Lucas Lundgren Having problem knowing where to dump your granny pictures? Why not on the internet? Who ...
iGoat – A Self Learning Tool for iOS App Pentesting and Security Swaroop Yermalkar OWASP iGoat is a learning tool for iOS developers (iPhone, iPad, etc.) and mobile app ...
Evil Devices and Direct Memory Attacks Ulf Frisk Total physical pwnage and plenty of live demos in this action packed talk! The PCILeech ...
Cryptocurrencies Benjamin Brown Cryptocurrencies: You keep using that word, anonymity. I do not think it means what you ...
Data Demolition: Gone in 60 Seconds Zoz Brooks Organizations know the importance of destroying retired physical data storage units: the waste stream has ...
Security in GCP Carly Schneider The cloud has become given internal developers the tools they need to work quickly and ...
The HTTP GET attack Hanno Böck A surprisingly simple attack can lead to devastating consequences: simply trying to download files with ...
Snakeoil Factory Inc: Risk Intelligence and Threat Intelligence Michael Goedeker This talk is focused on discussing some of the APT38 stuff we have been tracking ...
TBA Michael Goedeker Michael is the founder of Hakdefnet and security researcher focused on detecting and defending against ...
Exploiting a non-vulnerability Kallez What if you took the silliest issue you could find, present in almost all web ...