BSidesPerth 2018 Sept. 15, 2018 to Sept. 16, 2018, Perth, Australia
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
“London Calling, VoIP hacking for fun and profit… mostly profit” | Kai Frost | VoIP and its umbrella technology converged telecommunications is an area of InfoSec which even after ... | |
“SecDevSecOpsSec: let’s stop throwing around the buzzwords.” | Sarah Young | Everyone likes throwing the phrase “DevSecOps” out there at the moment, right? It’s a security ... | |
“Malware Meets Industrial Safety System and the Consequences” | Paresh Kerai | A Middle East Industrial Safety System was recently attacked with malicious malware designed specifically to ... | |
“Caring for our pen tester friends” | Brendan Seerup | Quality assurance teams are becoming more context driven and collaborative. QA Testers are now needed ... | |
“Secure SDLC Speed-run” | Matt Jones | Writing software comes with a lot of challenges – different industry trends and ways of ... | |
“Exploiting Steganography Image in MS Office Documents” | Lordian Mosuela | Dating back as far as ancient Greece, steganography involves concealing a message inside another message ... | |
“Not If but When?” Leveraging AI to jettison mantras of the Past: How AI will Liberate Security of the Future | John Mcclurg | John is working with the FBI to fix the problem of reactive security. For decades, ... | |
“Automating Arbitrage” | C_sto | Ever wanted to make free money? Me too! I wrote a program that automatically trades ... | |
“Double D! Diagnose | Detonate” | Nicholas Cairns | As defenders of devices, networks and systems we need to understand the threats we face! ... | |
“Security practice is broken. How can we fix it?” | Jodie Siganto | I’d like to look at the information security profession. As information security practitioners we think ... | |
“Subdomain Takeovers – Beginners to Advanced” | Michael Skelton | This talk aims to introduce hackers of all levels to subdomain takeovers. This talk will ... | |
“Bug Hunting in Open Source Software” | Silvio Cesare | In 2002 I performed a code review of the open source Operating System kernels. In ... | |
“Hardware Slashing, Smashing, Deconstructing and Reconstruction for Root access” | Deral Heiland | During this presentation I will be focusing on what is typically referred to as destructive ... | |
“What Your RF Signature Says About You” | Stephen | Invisible, inaudible, and ignored, your devices are currently screaming out large amounts of information about ... |