t2 2017 Oct. 26, 2017 to Oct. 27, 2017, helsinki,finland
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote | David Aitel | It's a Keynote! | |
Social engineering - Hacking your mind | Pete Poskiparta | Why social engineering is possible? How it works, why it works and what is the ... | |
T vs T or Why my offensive punch beats your forensics stance | Hugo Teso | Last year, right after 2016 edition of t2 infosec, a challenge was placed, and accepted. ... | |
Exploring enterprise Wi-Fi security with Aruba | Christoffer Jerkeby | Gaining keys to the castle through enterprise Wi-Fi. Access points designed to add mobility to ... | |
Lua code: security overview, practical approaches to static analysis, MSL tool | Andrei Costin | Abstract—Lua is an interpreted, cross-platform, embeddable, performant and low-footprint language. Lua's popularity is on the ... | |
Black Hat Locksmithing (with added Abloy) | Matt Smith | When locksmiths go bad. Black hat lockpicking has been around forever but it is very ... | |
Red Teaming Probably Isn't For You | Toby Kohlenberg | This talk will be an overview of what red teaming actually is; where it came ... | |
Amazon Web Services Security Tips | Dave Walker | In addition to discussing various AWS authorisation tips and tweaks to ensure API and asset ... | |
Breaking Tizen | Amihai Neiderman | Tizen is samsung's newest OS for it's devices and considered by them as the operation ... | |
Offensive Malware Analysis | Patrick Wardle | In this talk, we'll focus on the 'B' variant of FruitFly that even now, is ... | |
A little review of security challenges in Silicon Photonics integrated circuits. | Alexander Bolshev | Silicon photonics is the study and application of photonic systems which use silicon as an ... |