Archive for September, 2011

Talk: SMS Fuzzing – SIM Toolkit Attack

September 8, 2011

We’re pretty sure that you own a mobile phone and that you send and receive text messages. Do you feel at risk or somehow threatened? If not, then you might want to reconsider your opinion. Cell phones, no matter if dumb or smart, are always connected to the mobile phone network. This means that they […]

Tags: , ,
Posted in Conference Comments Off on Talk: SMS Fuzzing – SIM Toolkit Attack

Talk: Insight Into the Russian Black Market

September 7, 2011

You have all heard the term cybercrime, and you have heard about all things cybercrime – stolen credentials, data theft, fraud, blackmail and more. You may have heard the there are markets for goods connected to computer crime. You may have heard that there’s a lot of money in it (enough to pay off the […]

Tags: , ,
Posted in Conference Comments Off on Talk: Insight Into the Russian Black Market

Talk/Workshop: IPv6 Security In-Depth

September 6, 2011

The tale of two protocol suites has been being written for some time now. The IPv4 Internet has run out of fresh addresses. The IPv6 deployment has begun, but it will take some time before IPv4 is completely phased out (if ever). The work on the IPv6 protocol started in the early 1990s with the […]

Tags: , , ,
Posted in Conference Comments Off on Talk/Workshop: IPv6 Security In-Depth

Talk: The Management of IT Threats. European Digital Agenda’s Weakness

September 5, 2011

In case you haven’t heard about it, there is a digital agenda for the coming decade, developed by the European Commission. Cited from the web site: Europe 2020 is the EU’s growth strategy for the coming decade. In a changing world, we want the EU to become a smart, sustainable and inclusive economy. These three […]

Tags: , , ,
Posted in Conference Comments Off on Talk: The Management of IT Threats. European Digital Agenda’s Weakness

Encrypted Communication with DeepSec

September 4, 2011

For all of you who do not pay close attention to our contact section on our web site, we offer various way to communicate via encrypted messages. We have published two GPG keys, one for our role account (key 0x22860969)  and one for a person from our organisation team (key 0x6E4037AF). Use PGP/MIME format if […]

Tags: , , ,
Posted in Administrivia Comments Off on Encrypted Communication with DeepSec

Talk (U21): Solving Social Engineering Attacks

September 1, 2011

You’ve heard about social engineering. You know your weakest links. You have the task of defending your network against intruders. You know how to do this with your web applications, networks, clients and servers. All these things have neat classifications of attacks, best practice lists and lots of other resources. What about social engineering? How […]

Tags: , , , ,
Posted in Conference Comments Off on Talk (U21): Solving Social Engineering Attacks