Archive for April, 2019

Eth(er)ical Hacking – Hacker Defined Radio and analysing Signals

April 4, 2019

There is a lot going on in the wireless world. 5G is all the fashion, because frequencies are being auctioned. This is only the tip of the iceberg. Wireless protocols have become ubiquitous. The IEEE 802.11 family is one widespread example. Bluetooth, mobile networks, ZigBee, Z-Wave, and other wireless transmissions are widely used. If you […]

Tags: , , ,
Posted in Call for Papers, High Entropy Comments Off on Eth(er)ical Hacking – Hacker Defined Radio and analysing Signals

BSidesLondon Rookie Track – Personalities, Stories, Presentations

April 3, 2019

In past articles we have written about the BSidesLondon Rookie Track. We also spread to call for mentors a while ago. Let’s talk about the people who will present at the Rookie Track and who haven’t spoken at conferences yet. While there exist a lot of helpful advice out there on how to speak, how […]

Tags: , ,
Posted in Communication, Conference Comments Off on BSidesLondon Rookie Track – Personalities, Stories, Presentations

Ongoing DeepSec Call for Workshops – Trainers welcome!

April 2, 2019

The Call for Workshops for the DeepSec conference in November 2019 is still open. If you have something to teach, let us know as soon as possible! We intend to inform potential trainees in the beginning of May about their options. This allows for a better planning and preparation, because we receive early requests for […]

Tags: , , ,
Posted in Call for Papers, Training 2 Comments »

Network Security right from the Beginning – Introducing DHCP-over-TLS (DoT)

April 1, 2019

Every security researcher knows: If you want to secure a system, do it as early as possible. This is why Trusted Computing, Secure Boot, Trusted Execution Technology, and many more technologies were invented – to get the operating system safely off the ground right at boot time. After the booting process additional components have to […]

Tags: , ,
Posted in High Entropy Comments Off on Network Security right from the Beginning – Introducing DHCP-over-TLS (DoT)