Kiwicon 2014 Dec. 11, 2014 to Dec. 12, 2014, wellington,New zealand

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Eve, Mallory, Ocean's 11, and Jack Bauer: Adversaries Real and Imagined Morgan Marquis-boire In a post-Snowden world, it seems everywhere you turn you are faced with nation-state hacking, ...
Breaking Bricks and Plumbing Pipes: Cisco ASA a Super Mario Adventure Alec Stuart-muirk When Super Mario looks at your average network topology diagram he sees opportunity in those ...
Asymmetric Defense, and your buyers guide to Threat Intelligence Wepiv , Narc0 2 guys, 1 talk... wepiv and narc0sis are going to tag team this presentation WWF ...
Seeing Blu Matthew Garrett It's 2014 and people still care about DVD and Blu-ray region encoding. The number of ...
OneRNG - a verifiable and Open Hardware Random Number Generator from NZ Jim Cheetham , Paul Campbell The OneRNG is a USB serial device that collects high-quality entropy from its own hardware, ...
Eradicating the Human Problem Laura Bell People are a problem. We are tangled balls of emotional detritus that masquerades as a ...
Security the Etsy way: Effective security in a continuous deployment culture Rich Smith Effective security teams know that understanding people is just as important as understanding technology, and ... IncludeThinkstScapes
COMSEC - Beyond Encryption Rantyben , Thegrugq Have you ever wanted someone to just cut to the chase and tell you which ...
MitMing GSM with criminal intent William Turner In the past year, AmmonRa 'acquired' a [REDACTED] system. Using a software-defined-radio, and open source ...
Building a hipster catapult, or how2own your skateboard Richo , Mike Ryan Mike and Richo do hilarious and nasty things to a skateboard. Bask in their revelry ...
R00t Causes: complex systems failures and security incident response Hypatia , Hashoctothorpe Devops (or SRE etc) is a booming buzzword these days among mammals who run services. ...
ThruGlassXfer: The TV people? Do you see them? Ian Latter ThruGlassXfer (TGXf) is a new and exciting technique to steal files from a computer through ...
Cyberwar before there was Cyber: Hacking WWII Electronic Bomb Fuses Peter Gutmann While the Allies went to war with mechanical and chemical bomb fuses whose origins dated ...
BeEF for Vegetarians (Hooked Browser Meshed-Networks with WebRTC) Christian "xntrik" Frichot One of the biggest issues with BeEF is that each hooked browser has to talk ...
An Image is Worth 1000 Frauds – Detecting Fake Images and Videos Robert Winkel Magazines with photo shoots of super slim super models... Dictators releasing images that show their ...
Manipulating Human Minds: The Psychological Side of Social Engineering Christina Camilleri Since security is based on trust in authenticity as well as trust in protection, the ...
Recap of the aftermath of last year's bus hacking William Turner A run down of what happened after my talk last year. Did I go to ...
The National Cyber Security Strategy and the Connect Smart Partnership – building a secure, trusted and resilient cyber environm Paul Ash The National Cyber Policy Office is leading the development of a refreshed National Cyber Security ...
I know what you did last Wednesday: exploitation of the humble apartment video intercom Caleb Anderson I live in a building with over 700 apartments. Every apartment has a VOIP phone ...
Voltron: Defender of the Universe Snare One night in a fit of frustration with his debugging tools, snare hacked up a ...
Random() Adventures in Minecrosoftcraft Pruby 2.5 billion dollars is a fair bit of money to spend on a game. It ...
Legal loopholes Marissa Johnpillai Law aspires to be clear, unambiguous and standardised but in application is often vague, unpredictable ...
Breaking AV software Joxean Koret Antivirus software is a common component of today's computer systems ranging from home users to ...