BSidesLondon 2010 Feb. 15, 2010 to Feb. 15, 2010, London,UK

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
When I Grow Up I want to be a Cyberterrorist Michael Kemp Computer mediated terror is big business. Books get written. New reports get recorded. Every time ...
Breaking, Entering and Pentesting Steve Lord The majority of Penetration testing teams have staff falling into 3 of four categories: Nessus ...
Firewall? What Firewall? (Or "It's Common Criteria, it must be safe, I read it on the Internet") Steve Lord In this talk I discuss and demonstrate various means of post-exploitation firewall bypass, starting with ...
Trust thy neighbor? Matt Summers Should trust be given or earned? In the digital age who can you trust? We ...
Console yourself: Gaming threats in the workplace Chris "paperghost" Boyd The talk seeks to explain the risks that a net-connected console in the workplace can ...
Bringing the data back into data breaches Jelle Niemantsverdriet If you read in the papers about a data breach, you typically only read about ...
Is your smartphone app secure? No bloody clue, how do I use it? Graham Lee Back in the depths of history, when companies like Sun Microsystems still existed and portable ...
Why Security Business Cases Fail: What Cholera, Rubbish , and “The Dismal Science” Can Teach Us Simon Walker Primary research has found that many organisations have a confused approach to security business cases ...
TBA Manuel Between Sony rootkits, unavailable authentication servers its absolute inability to stop piracy, we have probably ...
Breaking out of restricted RDP Wicked Clown After doing a 5 mins talk at BruCON 2010, I am going to expand on ...
Web browsers: A history of rogues Chris "paperghost" Boyd Web-browsers. They’re all around us, on every PC across the length and breadth of the ...
Why technology, companies, and all of us are destroying the future of information security Peter Blay With the constant advancements in technology, companies can't afford to keep up, and so with ...
Pen. Testing Must Die Rory Mccune "Penetration testing" has become a staple of a the security programmes of a lot of ...
Malware writing 101 - A script kiddie's attempt at writing and masking Trojans Colin Mclean , Ellen Moar Writing Trojans is cool, what's better than remotely controlling other people's computers? But it also ...
Email Security: Chimera or Oxymoron? Nathaniel Borenstein Since the first email message was sent nearly 40 years ago, people have acted as ...
APT – What’s all the fuss about? David Stubley Is APT just FUD and fluster, mere media hype for the masses or a real ...
Cloud Computing Due Diligence - WTF? Jimmy Blake The media hype, both positive and negative, around cloud computing is often sensationalist. The reality ...
Jedi mind tricks for building application security programs David Rook , Chris Wysopal Software serves as the very fabric of how the world communicates and fuels 21st century ...
Seccubus - A tool to take the pain out of repeated vulnerability scanning Frank Breedijk Short or longer talk about Seccubus As part of his job as Security Engineer at ...
The road to hell is paved with best practises Frank Breedijk Presentation Abstract: This talk will try to address the "unaskable" question "will best practices make ...
Yep, FOCA Again Chema Alonso , Palako FOCA was born as a tool to analyze networks using extracted metada from public files. ...
DNS Tunnelling, Its all in the name! Arron "finux" Finnon In September 2000 a post came across the Slashdot website informing its readers of an ...
Digital Superheroes and Security Extremists Javvad Malik Faster than a 50meg broadband connection Stronger than AES256 encryption Able to escalate privileges in ...
Spammers And Other Twitts Miranda Mowbray Twitter does a good job overall of policing its social network, but there are nevertheless ...
Information Risk Management goes to the Movies. Stephen Bonner Stephen will present examples of the best and worst of hacking in Hollywood blockbusters and ...
How not to get hired for a security job. Stephen Bonner Over my career in IT security hundreds of staff have applied to work for me. ...
How not to sell me your security product. Stephen Bonner The IT Security ‘solution’ space is full of snake oil and bogus claims. This talk ...
All your logs are belong to you! Xavier Mertens Your IT infrastructure generates thousands(millions?) of events a day. They are stored in several places ...
The current state of PDF malware Paul Baccas "Traditionally, PDFs were thought of as a safe file format and during the Office macro ...
Underground Economy Craig Allan-mcwilliams The underground economy in the exchange of stolen personal and payment information is unfortunately thriving. ...
Practical Crypto Attacks Against Web Applications Justin Clarke The science of cryptography underpins many of the information security technologies we use on a ...
Honeypots, what are they and why should I care? Andrew Waite The use of honeypot systems and methodologies within information security go back a long way, ...
You built a security castle and forgot the bridge…now users are climbing your walls Soraya Oca Every year the UK wastes millions on IT projects. There are many reasons for this ...
Debriefing a defector from biosciences David Chismon As a molecular geneticist who recently defected to the security industry, I will be talking ...
Overcoming Organisational Challenges & Barriers to Adopting Cloud Computing Ian Moyse Adopting and enabling a cloud solution into your business is more than just a technical ...
Money for nothing and long distance for phree Sandro Gauci VoIP and security have a hard time sitting on the same sentence. This presentation will ...
Mankini Security - How to cover the Bare Essentials Brian Honan In an era of tightening budgets and increasing demands by the business to provide more ...
Layer 8 Security - Securing the Nut Between the Keyboard and the Screen Brian Honan Despite investing heavily in various technologies to secure their data, organisations still suffer security breaches. ...
On-line Privacy Controls: What They Don't Say Lizzie Coles-kemp On-line privacy controls have been the subject of much research but relatively little has been ...
Buffer Overflows - It's Ground hog Day!!! Lee Hughes Ground hog day was a movie where the same set of events happened day after ...
Scrubbing your SAP clean with SOAP Chris john Riley Lets scrub that SAP clean with SOAP!
UA Tester Chris john Riley Everything you wanted to know about User Agent strings but couldn't be bothered to lookup ...
Passwords are dead – But choose their replacement with care Stephen Howes The death knell for the traditional password is being rung as companies like Google and ...
Legal DDOS, London E-Counting , & Defending Your Rights - The Open Rights Group Glyn Wintle The Open Rights Group is the British equivalent of the EFF. Glyn will cover some ...
Filters Do Not Work Glyn Wintle A rapid fire collection of attack methods to bypass filters. This talk will cover every ...
Human Factor - not just idiot savant prime finding Stephen Bonner Stephen takes us beyond technology to look at the human angles of information security. Using ...
Breaking the links: Exploiting the linker Tim Brown The recent discussion relating to insecure library loading on the Microsoft Windows platform provoked a ...
Covertly Obvious – A Frayed Hat’s Techniques for maxing Breadth and Depth in Network Penetration Tests Martin Murfitt As the complexity and disparity of networks and the penetration tests that provide security assurance ...
Why desktop security is irrelevant in the mobile world Garry Sidaway Everyone knows that mobile technologies, social media and flexible working mean that we are connected ...
Teaching Computers to Catch Hackers Glenn Wilkinson Two exciting fields in computer science are those of machine learning and computer security. The ...
Hacking Online Auctions, Mostly for Profit Glenn Wilkinson Game theory. Auction theory. Economics. Statistics. These topics may not be what first comes to ...
Kick Ass Zero-Day Malware Hunting – Putting Aside the Obvious Alex Cox The hallowed ground of kick-ass, targeted and zero-day malware hunting previously has been reserved for ...
Real world forensic investigations brought to light: Case study Ryan Jones This talk will follow a forensic investigation into a pan-European company who suffered a data ...