t2InfoSecCon 2014 Oct. 23, 2014 to Oct. 24, 2014, helsinki,finland
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote | Aral Balkan | It's a keynote. | |
Style over Substance - how OEMs are breaking Android security | Robert Miller | Android has made significant steps in recent years in improving the security of the platform ... | |
Reversing iOS Apps - a Practical Approach | Patrick Wardle | Mobile apps are ever more ubiquitous, but their widespread adoption comes at a cost. Seemingly ... | |
Darshak: how to turn your phone into a low cost IMSI catcher device | Ravishankar Borgaonkar , Swapnil Udar | It is said that 80% of the world’s population now has a mobile phone. They ... | |
Keyless entry exploration/exploitation | Knud Hojgaard | This presentation will provide a walkthrough of the audit process of an IP-enabled physical access ... | |
ICSCorsair: How I will PWN your ERP through 4-20 mA current loop. | Alexander Bolshev | Modern Industrial Control Systems (ICS) are deeply integrated with other parts of corporate network. Plant ... | |
Code your (p)own Flight Simulator | Hugo Teso | On my previous talks on Aviation Security I always stopped after the exploitation of the ... | |
Murdoch's Pirates | Jan Saggiori | Started the Pay-Tv CAS Security exploration at 12-14 years old, with the first Canal+ France ... | |
Lockpicking and IT Security | Walter Belgers | In this lecture, Walter Belgers will look at some security flaws in locks to see ... | |
The Story Behind CosmicDuke | Timo Hirvonen | In early 2013, the MiniDuke malware was discovered in use in a series of attacks ... | |
Three Stories of Three Targets | Antti Tikkanen | In this presentation, we will look at three case studies of targeted attacks we have ... | |
Blind Code Coverage Fuzzing | Joxean Koret | The presentation will show a new, open source, distributed fuzzing suite with web administration called ... | IncludeThinkstScapes |
Watching the Apple Fall | Patrick Wardle | “It doesn’t get PC viruses. A Mac isn't susceptible to the thousands of viruses plaguing ... |