BSidesBudapest 2018 March 1, 2018 to March 1, 2018, Budapest, Hungary
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
A modern study of mic bugs operation and detection | Sebastian Valeros | In 2015, artist Ai Weiwei was bugged in his home, presumably by government actors. This ... | |
The Metric System | David Szili | In this presentation, we will see why security metrics are important and how they relate ... | |
How to exploit the DNSmasq vulnerabilites | Zoltán L. Németh | When a vulnerability is found, it is always an interesting question whether and how can ... | |
In-App virtualization to bypass Android security mechanisms of unrooted devices | Julien Thomas | In-App virtualization is becoming a popular subject on mobile platform. This unique feature of Android ... | |
Trape: the evolution of phishing attacks | Jose Espinosa | Trape is a recognition tool that allows you to track people and make phishing attacks ... | |
Detecting malware even when it is encrypted | Sebastian Strasak | With the increasing amount of malware HTTPS traffic, it is a challenge to discover new ... | |
Spying on botnets | Sandor Nemes | This talk will give a quick overview about the methods of collecting threat intelligence data ... | |
Let's dig in to the persistence mechanism world | Sandor Feher | I would like to demonstrate how easy it is to find a modern malware based ... | |
Hacking a teddy bear and buying passwords in the darknet | Tobias Schrödel | This talk demonstrates how a smart teddy bear can be hacked to allow strangers to ... | |
Assessment of users' IT security awareness in light of the GDPR | Dr. Kiss | After two years of implementation period the General Data Protection Regulation – GDPR, (Regulation (EU) ... | |
Hands-on secure software development from design to deployment | Gábor Pék | This workshop touches all the main phases of SDLC (i.e., design, development, code review, deployment) ... | |
XSS defense in-depth | Daniela Szpisjak | XSS is still one of the most dominant vulnerabilities of the web. Since its discovery, ... | |
Introduction to Bro Network Security Monitor | David Szilagyi | Bro is an open-source Network Security Monitor (NSM) and analytics platform. Even though it has ... | |
BadUSB with Arduino | Zoltan Abonyi | Have seen all the youtube videos about LEDs blinking, motors turning and switches clicking but ... |