The Grugq [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
OPSEC FOR THE AGE OF EGOTISTICAL GIRAFFE HackInTheBoxMalaysia-2014 - kuala lampur,malaysia
Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring. defcon-2014 - las vegas,usa
Click and Dagger: Denial and Deception on Android Smartphones Syscan360-2014 - Beijing,China
Practical OpSec for Android Devices Shakacon-2014 - Honolulu,USA
Click and Dagger: Denial and Deception on Android Smartphones Syscan-2014 - Merchant Court,Singapore
OPSEC: Because Jail is for wuftpd ZeroNights-2012 - Moscow, Russia Security
OPSEC: Because Jail is for wufpd HITBSecConf Malaysia-2012 - KL, Malaysia Security
OPSEC: Because Jail is for wuftpd ekoparty-2012 - Buenos Aires, Argentina
No Glove no Love: Perspectives on post-intrusion sanitisation and hygiene. Infiltrate-2012 - Miami, USA Security
Smashing the Slack For Fun and Profit 44Con-2011 - London,UK
Base Jumping: Attacking GSM Base Station Systems and Mobile Phone Base Bands BlackHatAbuDhabi-2010 - Emirates Palace, Abu Dhabi
Attacking Gsm Base Stations And Mobile Phone Basebands HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Mobile Security Security
Base Jumping: Attacking Gsm Base Station Systems And Mobile Phone Base Bands SyScan-2010 - Taipei, Taiwan Security Fuzzing
Base Jumping: Attacking Gsm Base Station Systems And Mobile Phone Base Bands NinjaCon-2010 - Vienna, Austria Mobile Security Security Wireless
Base Jumping: Attacking Gsm Base Station Systems And Mobile Phone Base Bands SyScan-2010 - Singapore Security Fuzzing
Base Jumping: Attacking Gsm Base Station Systems And Mobile Phone Base Bands SyScan-2010 - HangZhou, China Security Fuzzing
Base Jumping: Attacking Gsm Base Station Systems And Mobile Phone Base Bands Blackhat USA-2010 - Las Vegas, USA Security Fuzzing
Base jumping: Attacking GSM base stations and mobile phone basebands HITBDubai-2010 - Dubai,UAE
Pickpocketing mWallets: A Guide to Looting Mobile Financial Services HITBDubai-2009 - Dubai,UAE
How The Leopard Hides His Spots - Os X Anti-Forensics Techniques HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Analysis Testing
How the Leopard Hides his Spots: OS X Anti-Forensic Techniques HackLu-2008 - Luxembourg,Luxembourg
Anti-Forensic: Leaving The Police No Trails SyScan-2008 - Hong Kong, China Security
Ravaged Unleashed – The Tactical Voip Toolkit SyScan-2007 - Singapore Security
Ravage Unleashed: The Tactical VoIP Toolkit HITBDubai-2007 - Dubai,UAE
Voiphreaking: Siphallis Unveiled HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Analysis Testing
VoIP Phreaking: How to Make Free Phone Calls and Influence People BlackHatAsia-2005 - Tokyo,Japan
VoIPhreaking: How to make free phone calls and influence people HITBMalaysia-2005 - Kuala Lumpur,Malaysia
Speaking Freely: The Security And Privacy Challenges Of Modern Communications SyScan-2005 - Singapore Security Privacy
The Art Of Defiling: Defeating Forensic Analysis Blackhat USA-2005 - Las Vegas, USA Security Analysis
The Art of Defiling: Defeating Forensic Analysis BlackHatUSA-2005 - Las Vegas,USA
The Art Of Defiling: Defeating Forensic Analysis Blackhat Europe-2005 - Amsterdam, The Netherlands Security Analysis
The Art Of Defiling: Defeating Forensic Analysis On Unix File Systems SyScan-2004 - Singapore Security Analysis Unix
The Art Of Defiling: Defeating Forensic Analysis On Unix File Systems Blackhat Europe-2004 - Amsterdam, The Netherlands Security Analysis Unix
The Art Of Defiling: Defeating Forensic Analysis On Unix File Systems HITBSecConf Malaysia-2004 - Kuala Lampur, Malaysia Security Analysis Unix
The Art of Defiling: Defeating Forensic Analysis on Unix File Systems BlackHatAsia-2003 - Marina Bay,Singapore