Author Archive

Administrivia: How to access ROOTS and DeepSec 2017

August 22, 2017

We have received some question on how to attend the presentations of the 1st Reversing and Offensive-oriented Trends Symposium (ROOTS) 2017. It’s very easy. ROOTS is co-hosted with DeepSec 2017. This means if you attend DeepSec, you also attend ROOTS. In turn attending ROOTS gives you also access to the DeepSec conference. So you only […]

Tags: , ,
Posted in Administrivia, Conference No Comments »

DeepSec 2017 Preliminary Schedule published

August 17, 2017

After two weeks of intense reviewing we have published the preliminary schedule for DeepSec 2017. There are some blanks to fill, but this will be done in the coming weeks. We still have to do some reviews and wait for the speaker’s confirmation. In case you noticed, the ROOTS track is not filled yet. The […]

Tags: , , ,
Posted in Administrivia, Conference, Training No Comments »

DeepSec 2017 Schedule, ROOTS, and Closing of Call for Papers

August 3, 2017

Thanks a lot for your submissions! We are currently in the final phase of the review. Expect the first draft of the schedule for the end of the week. Important: Don’t forget that the Call for Papers for the 1st Reversing and Offensive-oriented Trends Symposium 2017 (ROOTS) is still open and was extended to 15 […]

Tags: , , ,
Posted in Administrivia, Conference No Comments »

Last Call – DeepSec 2017 “Science First!” – Call for Papers

July 31, 2017

Today our Call for Papers for DeepSec 2017 (motto Science first!) officially ends. We are still up to our necks in submissions, but if you have content and want to join, then make sure you submit now! All in-time submissions will be preferred over the ones that missed the d(r)eadline! The call for papers for […]

Posted in Administrivia, Call for Papers No Comments »

Unicorns in the Wild – Information Security Skills and how to achieve them

July 27, 2017

Everyone talks about information security, countering „cyber“ threats, endless feats of hackers gone wrong/wild, and more epic stories. Once you have realised that you are reading the news and not a script for a TV series, you are left with one question: What are information security skills? The next question will probably be: How do […]

Tags: , , ,
Posted in Discussion, High Entropy, Security No Comments »

DeepINTEL Schedule updated – Psychology and Power Grids

July 27, 2017

We have updated the schedule for DeepINTEL 2017. The human mind and power grids are both critical infrastructure. Both can be manipulated and switched off, arguably. And most of us use both every day. So this is why we added two more presentations to the schedule. Stefan Schumacher of the Magdeburg Institute for Security Research talks […]

Tags: , ,
Posted in Administrivia, Conference No Comments »

Malicious Software explores new Business Models – Politics

July 19, 2017

Malicious software has become a major component of criminal business and geopolitics. In addition it is a convenient explanation for anything one does not want to investigate. Since code always come from somewhere you have to ask yourself many more questions when it comes to infected networks and compromised hosts. What is the agenda of […]

Tags: , , , ,
Posted in Discussion, Internet, Security No Comments »

Digital Security of the Future: Technology and Algorithms alone are no Substitute for Strategy

July 14, 2017

Unfortunately, you can not rely on antivirus programs when it comes to the security of your own business. Antivirus programs do not read newspapers, they do not attend lectures, they don’t protect you from social engineering or know the meaning of Facebook friends or Twitter tweets. False friends, indeed. The continuous monitoring and evaluation of […]

Tags: , , , , , ,
Posted in Conference, Security Intelligence No Comments »

ROOTS 2017, DeepSec, and DeepINTEL Call for Papers are still open

June 26, 2017

Our wonderful world of technology is full of surprises, bugs, intentional weaknesses, adversaries, defenders, vendors, and users. Some software just got more lines of code instead of a decent audit or refactoring. Everything is turning smart, but no one knows what smart really means. Big Data is all the fashion, Big Knowledge still isn’t. So […]

Tags: , , , ,
Posted in Call for Papers, Internet, Security, Security Intelligence No Comments »

BSidesLondon 2017 – Sharing is indeed Caring

June 20, 2017

When airport security meets information security it’s usually BSidesLondon time. It was a great experience. And since DeepSec sponsors the Rookie Track we had a very tough decision to make. It’s really hard to pick a winner. A lot of presentations were excellent, and the presenters made the most out of the 15 minutes. The […]

Tags: , ,
Posted in Discussion, High Entropy No Comments »

The Future of Entangled Security States – Quantum Computing Conference in Berlin

May 25, 2017

Quantum computing is a fashionable term these days. Some IT news articles are talking about post-quantum cryptography, qbits, and more quantum stuff. If you don’t know how the terms relate to each other, what entangled states in quantum physics are, and what everything has to do with computing, then you will have a hard time […]

Tags: , , , ,
Posted in Conference, Security No Comments »

Biometrics and Failures in understanding Security – Copy & Paste Iris Scans

May 23, 2017

Biometrics has an irresistible attraction. Simply by mentioning the fact that you can measure parts (or surfaces) of the body and convert them to numbers a lot of people are impressed out of their mind. Literally. In theory biometric information serves as a second set of data to be used for any purposes. A common […]

Tags: , ,
Posted in High Entropy, Security No Comments »

Disinformation Warfare – Attribution makes you Wannacry

May 16, 2017

After the Wannacry malware wreaked havoc in networks, ticket vending machines, companies, and hospitals the clean-up has begun. This also means that the blame game has started. The first round of blame was distributed between Microsoft and the alleged inspiration for the code. The stance on vulnerabilities of security researchers is quite clear. Weaknesses in […]

Tags: , , ,
Posted in Discussion, High Entropy, Security Intelligence No Comments »

Wannacry, Code Red, and „Cyber“ Warfare

May 14, 2017

Society and businesses increasingly rely on networked infrastructure. This is not news. Worms that used networks to spread to new hosts in order to infect them is also not news. Code Red did this back in 2001. There is a new worm going around. Its name is Wannacry, and it is allegedly based on published […]

Tags: , , , ,
Posted in High Entropy, Security No Comments »

DeepSec welcomes SEC Consult as Sponsor for 2017!

May 12, 2017

Testing products, production code, security measures, or the overall security of infrastructure is hard work. The typical needs in term of information technology for a company or an organisation has become a variety of components that need to be maintained and hardened against attacks. The devil is in the details. In order to find critical […]

Tags: , ,
Posted in Conference, Security No Comments »