bsideslondon 2016 June 8, 2016 to June 8, 2016, london,uk
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Is TOR/I2P traffic bad for your site? | Ben herzberg | There seems to be a confusion around the "Cyber" market revolving anonymized traffic. We researched ... | |
Offensive Anti-Analysis | Holly Williams | A talk about options advanced attackers can deploy to beat behavioural malware analysis through the ... | |
Opsec for hackers | Porthunter | This talk will demonstrate how military strategy can be applied to information and operational security. | |
LoRa the Explorer - Attacking and Defending LoRa systems | Robert Miller | LoRa is a Low Powered Wide Area Network (LPWAN) solution designed to enable smart city ... | |
Open Source Malware Lab | Robert Simmons | The landscape of open source malware analysis tools improves every day. A malware analysis lab ... | |
Workshop 1- Session 1 Using R for analysing security data | Steph Locke | We need to get the most out of the data available to us. R is ... | |
What does the Apple Watch watch (or why would an attacker care if you wear Android Wear) | Sam Phelps | Wearable technology is introducing an ever increasing amount of sensors into our daily lives, allowing ... | |
Introduction to hacking video games | Elliot Ward | I would to provide an introduction into why someone would want to hacking video games, ... | |
Bytes between the lines: Hidden data in plain sight. | Shlomie Liberow | Whilst building an android app to aid users in parking ticket appeals, I collected parking ... | |
Workshop 3- Session 2: Boot to Rooting - Attacking Vulnerable VMs | Vulnhub | The workshop aims to provide a methodology which can be used when attacking vulnerable machines. ... | |
Taking honeypots from research to corporate value | Andrew Waite | Honeypots are regularly used from a research perspective, but often seen as either limited corporate ... | |
Bug hunting with Static Code Analysis | Nick jones | How do we make application security assessments more efficient? Finding and fixing security issues just ... | |
Honeypots and Deceptive Operations: Can you catch more spies with honey(pots)? | David Chismon | Detecting advanced (or just effective) attackers on internal networks is the subject of much research ... | |
Social Engineering for Dummies | Callan Garratley | The Who, What, Where and When of Social Engineering. Covering a series of the definitions ... | |
Incident Triage; Applying the Checklist Manifesto in high-stress situations | Jon Medvenics | The talk is aimed at outlining the methodology of the Checklist Manifesto (Atul Gawande, 2011), ... | |
Workshop 1- Session 2&3 - Mock Interviews | Ben Dewar-powell | Ben and Co. will be running "Mock interviews" in slots of 15 mins . Roughly ... | |
Malware Mythbusting - Lies, Damn Lies and Linguistics | Carl Gottlieb | Cutting through the FUD of the Anti-Malware industry to expose some home truths about the ... | |
Getting better with data | Steph Locke | So many alerts and dashboards, so little time. It's incredibly tough to know what to ... | |
Naughty Toys For Wicked Girls And Boys | Steve Lord | Fight Club's Tyler Durden once said, "one can make all kinds of explosives using simple ... | |
Pwning the Micro:Bit. | Edmond Locard | Got your hands on a Micro:Bit yet? In this short talk, we'll cover where the ... | |
Workshop 3- Session 3: Up and running with Dradis Community v3.1 | Daniel P. Martin | Over the last year there's been a lot of spit and polish going on in ... | |
Workshop 2 - Session 3: Glitch attacks against embedded systems | Robert Miller , Joel Clark | Clock glitches let attackers exploit applications through the hardware they are running on, letting them ... | |
Exploiting Web Application Obscurity | Rohan Durve | I'd like to present a talk and material on less frequently exploited vulnerabilities such as ... | |
Investigation & Analysis of Phishing Scams in Ireland | Oxana Sereda | Phishing attacks have been used by criminals for years and they still remain as an ... | |
Cyber by any other name would smell as insecure: the language of security | Jessica Barker | The language of security is something which divides and delights us. ‘Cyber’ is rejected and ... | |
iOS malware: myth or reality? | Julien Bachmann | The end of 2015 was filled with a growing number of news about mobile malware ... | |
Take a step back | John Moss | Logic Flaws seem to be the often forgotten vulnerability missed by many technical vulnerability scanners ... | |
How I travelled from retail to InfoSec, the long way round | Lee Munson | Qualifications: none Certifications: none Experience: none Technical skills: none Did any of these disadvantages stop ... | |
Workshop 1 Session 4 - Personality Types in Security Culture | Kai Roer | This interactive workshop looks at how personality types impacts security: how some personality types may ... | |
honeyHoax - A centralised honeypot | Jordan Constantine | Honeypots and IDSÍs can be an invaluable security mechanism with respect to obtaining intelligence on ... | |
Emerald City of Cyber Security | Ben herzberg | NOTE: This session requires special goggles, which we will hand out prior to its beginning ... | |
OSTrICa – Open Source Threat Intelligence Collector – An OpenSource plugin-oriented framework to collect Threat Intelligence Information | Roberto Sponchioni | Current approaches to protect sensitive data, such as Intrusion Detection Systems, Anti-Virus programs, traditional Incident ... | |
Workshop 2- Session 4: Bug Sweeping like a boss | Richard J. Brain , Kirsty Thomson | In this 1 hour workshop the team will cover core physical countermeasures equipment. The aim ... | |
Docker: Security Myths, Security Legends | Rory Mccune | You can't have helped seeing the rise of containerization in general and Docker specifically in ... |