Category: Security
-
+
+
+
+
+
+
The following photos of slides that are some of my favorites from Def Con #27 (2019). Default Elevator Passwords SQL Injection's Found In Vendor Databases For Schools Radar Gun Frequencies Some References On How To "Mess With" Radar Guns Multi-Printer Attack Surfaces More Detail On Multi-Printer Attack Surfaces Sound Damage…
-
+
+
+
+
+
+
Here are my DEF CON notes from the sessions that I attended in 2019 for DEF CON 27: defcon27-2019-report_DRAFT.pdf Please fell free to do what you want with these notes. I go to sessions so you don't have to. Here some quick links to notes from previous years: 26 (2018), 25…
-
+
+
+
+
+
+
Picture from RawPixel Thrown For A Curve (Update) See July update for my first report on my recent lower back injury with sciatica down my left leg. Things are improving, but I'm still having numbness on my left foot and periodic spasms & tightening on my calf and glute…
-
+
+
+
+
+
+
Here are my DEF CON notes from the sessions that I attended in 2017 for DEF CON 25: DEFCON 25 NOTES (2017) [PDF] Please fell free to do what you want with these notes. I go to sessions so you don't have to. Here some quick links to notes from…
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
-
+
+
+
+
+
+
Here are my DEF CON notes from the sessions that I attended and the presentation material that was shared: DEF CON 23 NOTES (2015) [PDF] In addition my previous notes (all in PDF) are available for 22 (2014), 21 (2013), 20 (2012), 19 (2011), & 18 (2010). I wish I started…
-
+
+
+
+
+
+
The PCI Security Standards Council has released guidance (PDF) to businesses to show them how to use penetration testing to identify network vulnerabilities that could be exploited for malicious activity. [tbusinessnet.com, bankinfosecurity.com, news.google.com] There is also a discussion thread over on SANS.org Forums.
-
+
+
+
+
+
+
The CISSP Domains (Effective April 15, 2015) will be changing: Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity) Asset Security (Protecting Security of Assets) Security Engineering (Engineering and Management of Security) Communications and Network Security (Designing and Protecting Network Security) Identity and Access Management (Controlling Access and…
-
+
+
+
+
+
+
A detailed conference report of the sessions attended has been posted: DEFCON22 (PDF). In addition, here is a summary of DEFCON 22 related news articles of potential interest: Founder of America’s Biggest Hacker Conference: ‘We Understand the Threat Now’ [Time] Black Hat, Defcon Conferences: From Hackers to Pwnie Awards [eweek] DEFCON's…
-
Listen! (Size 2.12 MBs, Running Time 2m10s) Today's podcast is inspired by the Dog Days Of Podcasting (#DDOP). It is a single focus recommendation on why I have NMAP in my security toolkit and why you should consider it. Feel free to follow along with Steve Holden at: Twitter and/or Google+. For technology news only…
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
-
+
+
+
+
+
+
Here are some links to stories about TrueCrypt shutting down: ThreatPost.com KrebsOnSecurity.com Reddit's SysAdmin Reddit's NetSec EtcWiki.org TheHackerNews.com TheRegister.co.uk TrueCrypt is a key tool in our toolkit for protecting data and we use it everyday. If it is actually going to go away then it will leave a big whole…