t2InfoSecCon 2014 Oct. 23, 2014 to Oct. 24, 2014, helsinki,finland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Aral Balkan It's a keynote.
Style over Substance - how OEMs are breaking Android security Robert Miller Android has made significant steps in recent years in improving the security of the platform ...
Reversing iOS Apps - a Practical Approach Patrick Wardle Mobile apps are ever more ubiquitous, but their widespread adoption comes at a cost. Seemingly ...
Darshak: how to turn your phone into a low cost IMSI catcher device Ravishankar Borgaonkar , Swapnil Udar It is said that 80% of the world’s population now has a mobile phone. They ...
Keyless entry exploration/exploitation Knud Hojgaard This presentation will provide a walkthrough of the audit process of an IP-enabled physical access ...
ICSCorsair: How I will PWN your ERP through 4-20 mA current loop. Alexander Bolshev Modern Industrial Control Systems (ICS) are deeply integrated with other parts of corporate network. Plant ...
Code your (p)own Flight Simulator Hugo Teso On my previous talks on Aviation Security I always stopped after the exploitation of the ...
Murdoch's Pirates Jan Saggiori Started the Pay-Tv CAS Security exploration at 12-14 years old, with the first Canal+ France ...
Lockpicking and IT Security Walter Belgers In this lecture, Walter Belgers will look at some security flaws in locks to see ...
The Story Behind CosmicDuke Timo Hirvonen In early 2013, the MiniDuke malware was discovered in use in a series of attacks ...
Three Stories of Three Targets Antti Tikkanen In this presentation, we will look at three case studies of targeted attacks we have ...
Blind Code Coverage Fuzzing Joxean Koret The presentation will show a new, open source, distributed fuzzing suite with web administration called ... IncludeThinkstScapes
Watching the Apple Fall Patrick Wardle “It doesn’t get PC viruses. A Mac isn't susceptible to the thousands of viruses plaguing ...