Kiwicon 2014 Dec. 11, 2014 to Dec. 12, 2014, wellington,New zealand
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Eve, Mallory, Ocean's 11, and Jack Bauer: Adversaries Real and Imagined | Morgan Marquis-boire | In a post-Snowden world, it seems everywhere you turn you are faced with nation-state hacking, ... | |
Breaking Bricks and Plumbing Pipes: Cisco ASA a Super Mario Adventure | Alec Stuart-muirk | When Super Mario looks at your average network topology diagram he sees opportunity in those ... | |
Asymmetric Defense, and your buyers guide to Threat Intelligence | Narc0 , Wepiv | 2 guys, 1 talk... wepiv and narc0sis are going to tag team this presentation WWF ... | |
Seeing Blu | Matthew Garrett | It's 2014 and people still care about DVD and Blu-ray region encoding. The number of ... | |
OneRNG - a verifiable and Open Hardware Random Number Generator from NZ | Jim Cheetham , Paul Campbell | The OneRNG is a USB serial device that collects high-quality entropy from its own hardware, ... | |
Eradicating the Human Problem | Laura Bell | People are a problem. We are tangled balls of emotional detritus that masquerades as a ... | |
Security the Etsy way: Effective security in a continuous deployment culture | Rich Smith | Effective security teams know that understanding people is just as important as understanding technology, and ... | IncludeThinkstScapes |
COMSEC - Beyond Encryption | Rantyben , Thegrugq | Have you ever wanted someone to just cut to the chase and tell you which ... | |
MitMing GSM with criminal intent | William Turner | In the past year, AmmonRa 'acquired' a [REDACTED] system. Using a software-defined-radio, and open source ... | |
Building a hipster catapult, or how2own your skateboard | Mike Ryan , Richo | Mike and Richo do hilarious and nasty things to a skateboard. Bask in their revelry ... | |
R00t Causes: complex systems failures and security incident response | Hypatia , Hashoctothorpe | Devops (or SRE etc) is a booming buzzword these days among mammals who run services. ... | |
ThruGlassXfer: The TV people? Do you see them? | Ian Latter | ThruGlassXfer (TGXf) is a new and exciting technique to steal files from a computer through ... | |
Cyberwar before there was Cyber: Hacking WWII Electronic Bomb Fuses | Peter Gutmann | While the Allies went to war with mechanical and chemical bomb fuses whose origins dated ... | |
BeEF for Vegetarians (Hooked Browser Meshed-Networks with WebRTC) | Christian "xntrik" Frichot | One of the biggest issues with BeEF is that each hooked browser has to talk ... | |
An Image is Worth 1000 Frauds – Detecting Fake Images and Videos | Robert Winkel | Magazines with photo shoots of super slim super models... Dictators releasing images that show their ... | |
Manipulating Human Minds: The Psychological Side of Social Engineering | Christina Camilleri | Since security is based on trust in authenticity as well as trust in protection, the ... | |
Recap of the aftermath of last year's bus hacking | William Turner | A run down of what happened after my talk last year. Did I go to ... | |
The National Cyber Security Strategy and the Connect Smart Partnership – building a secure, trusted and resilient cyber environm | Paul Ash | The National Cyber Policy Office is leading the development of a refreshed National Cyber Security ... | |
I know what you did last Wednesday: exploitation of the humble apartment video intercom | Caleb Anderson | I live in a building with over 700 apartments. Every apartment has a VOIP phone ... | |
Voltron: Defender of the Universe | Snare | One night in a fit of frustration with his debugging tools, snare hacked up a ... | |
Random() Adventures in Minecrosoftcraft | Pruby | 2.5 billion dollars is a fair bit of money to spend on a game. It ... | |
Legal loopholes | Marissa Johnpillai | Law aspires to be clear, unambiguous and standardised but in application is often vague, unpredictable ... | |
Breaking AV software | Joxean Koret | Antivirus software is a common component of today's computer systems ranging from home users to ... |