Archive for February, 2014

DeepSec 2013 Video: Malware Datamining And Attribution

February 7, 2014

Popular culture totally loves forensics (judging by the number of TV shows revolving around the topic). When it comes to software a detailed analysis can be very insightful. Most malicious software isn’t written from scratch. Some components are being reused, some are slightly modified (to get past the pesky anti-virus filters). This means that (your) […]

Tags: , , , ,
Posted in Conference, Security 2 Comments »

DeepSec 2013 Video: Trusted Friend Attack – (When) Guardian Angels Strike

February 6, 2014

We live in a culture where everybody can have thousands of friends. Social media can catapult your online presence into celebrity status. While your circle of true friends may be smaller than your browser might suggest, there is one thing that plays a crucial role when it comes to social interaction: trust. Did you ever […]

Tags: , , , , ,
Posted in Conference, Internet, Security, Stories Comments Off on DeepSec 2013 Video: Trusted Friend Attack – (When) Guardian Angels Strike

DeepSec 2013 Video: Auditing Virtual Appliances – An Untapped Source Of 0-days

February 5, 2014

Appliances are being sold and used as security devices. The good thing about these gadgets is an improvement of your security (usually, YMMV as the Usenet folks used to write). The bad thing about inserting an unknown amount of code into your defence system are the yet to be discovered flaws in its logic. In […]

Tags: , , , ,
Posted in Conference, Security, Stories 6 Comments »

DeepSec 2013 Video: The Economics Of False Positives

February 4, 2014

Once you set up alarm systems, you will have to deal with false alarms. This is true for your whole infrastructure, be it digital or otherwise. When it comes to intrusion detection systems (IDS) you will have to deal with false positives. Since you want to be notified of any anomalies, you cannot ignore alarms. […]

Tags: , , ,
Posted in Conference, Discussion, Security 2 Comments »

DeepSec 2013 Video: Uncovering your Trails – Privacy Issues of Bluetooth Devices

February 3, 2014

Devices with Bluetooth capabilities are all around us. We have all gotten used to it. Smartphones, laptops, entertainment electronics, gaming equipment, cars, headsets and many more systems are capable of using Bluetooth. Where security is concerned Bluetooth was subject to hacking and security analysis right from the start. Bluedriving, Bluejacking, cracking PIN codes, and doing […]

Tags: , , , , ,
Posted in Conference, Security Comments Off on DeepSec 2013 Video: Uncovering your Trails – Privacy Issues of Bluetooth Devices