BsidesLasVegas 2014 Aug. 5, 2014 to Aug. 6, 2014, las vegas,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Wireless Essentials | Dragorn , Dakahuna , Rick Mellendick , Zero Chaos , Russell Handorf | This class will cover the essentials of using Pentoo, current and emerging 802.11 wireless threats, ... | |
Building Skills, Understanding and Influencing People | I Cavalry | The directed sessions will use a facilitated Question and Answer format called A&Q. In this ... | |
Attacking Drupal | Greg Foss | Drupal is a very popular content management system that has been widely adopted by government ... | |
Vaccinating Android | Milan Gabor , Danijel Grah | Number of mobile applications is rising and Android still holds large market share. As these ... | |
Demystiphying and Fingerprinting the 802.15.4/ZigBee PHY | Sergey Bratus , Ira Ray Jenkins | Producing IEEE 802.15.4 PHY-frames reliably accepted by some digital radio receivers, but rejected by others---depending ... | |
Energy-efficient bcrypt cracking | Katja Malvoni | N/A | |
Password Generators & Extended Character Set Passwords | William Gray , Stephen Lombardo | N/A | |
Ripped from the Headlines What the news tells us about Information Security Incidents | Kevin Thompson , Suzanne Widup | Take a scientific look at information security incidents reported in the public news sources. This ... | |
RFID Hacking | Joshua Perrymon , Sean Satterlee | Learn the basics of RFID hacking, in this workshop you will be guided through building ... | |
Hackers vs Auditors | Dan Anderson | A view into what hackers are about and what auditors are about, comparison and contrasting. | |
Insider Threat Kill Chain: Human Indicators of Compromise | Ken Westin | Your organization’s greatest assets are also its greatest threat: People. Your greatest risk are those ... | |
Security testing for Smart Metering Infrastructure | Robert Hawk , Steve Vandenberg | In July 2010, BC Hydro, the electric utility and grid operator of British Columbia began ... | |
Fuck These Guys: Practical Countersurveillance | Lisa Lorenzin | We've all seen the steady stream of revelations about the NSA's unconstitutional, illegal mass surveillance. ... | |
The problem with the real world | Michal Špaček | N/A | |
Encryption and Authentication: Passwords for all reasons | Jeffrey Goldberg | N/A | |
Third-Party Service Provider Diligence: Why are we doing it all wrong? | Patrice Coles | The demands of Third Party Service Provider vendor due diligence and compliance management are growing ... | |
A Place to Hang Our Hats: Security Community and Culture | Domenic Rizzolo | Contrary to popular belief and media depictions, hacking is a social endeavor. By examining the ... | |
Pwning the hapless or How to Make Your Security Program Not Suck | Casey Dunham , Emily Pience | Pwning the hapless or How to Make Your Security Program Not Suck Customer data is ... | |
Password Topology Histogram Wear-Leveling, a.k.a. PathWell | Rick Redman | N/A | |
Enhancing Password Based Key Derivation Techniques | Stephen Lombardo , Nick Parker | N/A | |
The Savage Curtain | Tushar Dalvi , Tony Trummer | Mobile, the Final Frontier. These are the voyages of two researchers. Their 45 minute mission: ... | |
Booze, Devil's Advocate, and Hugs: the Best Debates Panel You'll See at BSidesLV 2014 | Zach Lanier , David Mortman , Joshua Corman , David Kennedy , Jay Radcliffe | Our four intrepid debaters will tackle the most pressing issues facing the security community today, ... | |
Ask the EFF | Kurt Opsahl , Eva Galperin , Yan Zhu , Mark Jaycox , Nate Cardozo | Once again, the Electronic Frontier Foundation returns to the Underground to answer your toughest Off-the-Record ... | |
Teach a man to Phish... | Vinny Lariza | "When the world ends, the only things that will be left on earth will be ... | |
The Lore shows the Way | Eric Rand | Mistakes have been made, and mistakes will be made again. Those unfamiliar with the history ... | |
Beam Me Up Scotty! – Passwords in the Enterprise | Dimitri Fousekis | N/A | |
Capturing Passwords into the Secure Desktop | Bruno Oliveira , Marcio Almeida Macedo | N/A | |
We Hacked the Gibson! Now what? | Philip Young | IBM has been touting the security of the mainframe for over 30 years. So much ... | |
Pwning the Pawns with WiHawk | Anamika Singh , Santhosh Kumar | ***THIS TALK IS VIA VIDEO CONFERENCE THE US CONSULATE IN CHENNAI COULDN'T PROCESS THEIR VISAS ... | |
The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State | Richard Thieme | Over a decade ago, a friend at the National Security Agency told Richard Thieme that ... |