CopenhagenCybercrimeConfrence 2015 June 11, 2015 to June 11, 2015, Copenhagen,Amsterdam
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
ATM Jackpotting in the Wild | Thomas Siebert , Marc Ester | ATMs, being full of money, are a classical target of criminals. In recent times, attackers ... | |
Can Encryption Save the World? | Peter Landrock | There is only one way to protect data: Using cryptographic techniques, be it for authentication, ... | |
DKCERT – An Academic Computer Security Incident Response Team in the Global CERT- and CSIRT-Network | Henrik Larsen | DKCERT – the Danish academic Computer Security Incident Response Team – is an organisation within ... | |
Don’t be an ostrich – be a chipmunk | Manuel Vigilius | One thing is certain about crises: Sooner or later you will run into one. It ... | |
How I hacked my Home | David Jacoby | In the IT-security industry, we are at the moment releasing articles about how hackers and ... | |
How Website Insecurity Can Ruin Your Business | Peter Kruse | A large number of corporate websites in Denmark are vulnerable to different types of attacks, ... | |
Information security - current challenges and perspectives | Adam Lebech | Information security should be on top of the agenda for CEOs today - not just ... | |
Operation Potato Express: Analysis of a Cyberespionage Toolkit | Robert Lipovsky , Anton Cherepanov | The talk uncovers details about an espionage malware family used against targets in numerous countries, ... | |
Physical [In]Security: It’s not ALL about Cyber | Inbar Raz | Today's threat landscape is all about Cyber. We have cyber threats, cyber security, cyber warfare, ... | |
Practical experiences in Outsourcing | Kurt Sejr Hansen | The presentation will give a short overview of what to consider before, under and after ... | |
PUA – Potentially Unwanted Advice | Righard J. Zwienenberg | For a long time now, security experts have advised users to use ad-blockers, pop-up blockers, ... | |
The Attack of the Killer Tomatoes | Gabor Szappanos | Malware authors are not shy about borrowing ideas. One of the most typical cases was ... | |
The Stuxnet-O-Meter: Measuring Complexities | Marion Marschalek | A few years back the threat detection industry introduced the imaginary line between common mass ... | |
Waterfall Computing – Creating Value in the Absence of Big Data | Paul A. Vixie | Buzzword compatible Internet security startups like to talk about their Big Data Stack. But just ... |