BSidesTLV 2017 June 28, 2017 to June 28, 2017, tel avov,israel
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Opening Keynote Chris Nickerson, co-founder BSides Security Movement | Chris Nickerson | N/A | |
From Zero to Phishing in 60 seconds | Luda Lazar | In the recent years phishing activity has grown rapidly, with thousands of phishing sites popping ... | |
VoIP, Printers and other PWNABLES! | Alper Basaran | Anything connected to the network should be secured. Over the years we've have countless breaches ... | |
What Every Hacker Used to Know, a walk down history lane | Guy Barnhart-magen | What Every Hacker Used to Know, a walk down history lane The audience will learn ... | |
Mobile Containers—The Good, the Bad and the Ugly | Yair Amit | This presentation relies on our RSA Conference US 17’ presentation, which got very good feedback ... | |
Healthcare CyberSecurity is in Critical Condition | Josh Corman | N/A | |
AtomBombing: Injecting Code Using Windows’ Atoms | Tal Liberman | We breakdown AtomBombing into three main stages: 1. Write-What-Where – Writing arbitrary data to arbitrary ... | |
Peekaboo! I Own You. The Tale of Hundreds of Thousands Vulnerable Devices with no Patch, Ever. | Amit Serper | Imagine that you've purchased your small a cheap ip security camera to feel just a ... | |
Hillbilly BBQ: Your rail networks put to use to facilitate OUR party… | Chris Roberts | We’ve focused on numerous forms of transportation over the years with varying degrees of success. ... | |
Web Cache Deception attack: A new web attack vector | Omer Gil | Web Cache Deception attack is a new web attack vector that puts various technologies and ... | |
Don’t let the cuteness fool you – Exploiting IoT’s MQTT protocol | Moshe Zioni | "Connect all the things!" is, for some time now, the main theme when talking about ... |