Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'DeepSec' | www.SecurityPhresh.com
Security News from 'DeepSec'
Showing 'Security News from 'DeepSec'' from 51 to 60
Who Watches The Watcher? Detecting Hypervisor Introspection From Unprivileged Guests
2nd Jan 2019 [2 years ago] from DeepSec
Over the last decade we have seen a rapid rise in virtualization-based tools in which a hypervisor is used to gain insight into the runtime execution of a system. With these advances in introspection techniques, it is no longer a question...
Uncovering Vulnerabilities In Secure Coding Guidelines
2nd Jan 2019 [2 years ago] from DeepSec
Several government-related and private organizations provide guidance on how to improve the security of existing software as well as best practices for developing new code. These organizations include the Computer Emergency Readiness Team...
Suricata And XDP, Performance With An S Like Security
2nd Jan 2019 [2 years ago] from DeepSec
extended Berkeley Packet Filter (eBPF) and eXtreme Data Path (XDP) technologies are gaining in popularity in the tracing and performance community in Linux for eBPF and among the networking people for XDP. After an introduction to these...
2nd Jan 2019 [2 years ago] from DeepSec
SS7 is to the PSTN what BGP is for the Internet. In this presentation Paul will explain the fundamentals of the SS7 protocol and telecommunications architecture. An overview of how SS7 is utilized by large enterprises, mobile networks and...
Security As A Community Healthcare: Helping Small Non-Profit Organisations Stay Secure
2nd Jan 2019 [2 years ago] from DeepSec
This talk will look at the way Privacy International has relied on its experience from working with a network of small NGOs across the Global South to shape its approach to security and develop Thornsec, an automated way to deploy, test,...
25th Dec 2018 [2 years ago] from DeepSec
Androids accessibility API was designed to assist users with disabilities, or temporarily preoccupied users unable to interact with a device, e.g., while driving a car. Nowadays, many Android apps rely on the accessibility API for other...
Efail And Other Failures With Encryption And E-Mail
21st Dec 2018 [2 years ago] from DeepSec
The Efail bug against encrypted e-mails showed a variety of problems with the interaction of outdated cryptography and HTML e-mails. This talk will give an overview of the flaws that led to Efail and some other fun attacks that followed...
ROOTS - Kernel-Assisted Debugging Of Linux Applications
19th Dec 2018 [2 years ago] from DeepSec
On Linux, most---if not all---debuggers use the ptrace debugging API to control their target processes. However, ptrace proves unsatisfactory for many malware analysis and reverse engineering tasks: So-called split-personality malware often...
ROOTS - Library And Function Identification By Optimized Pattern Matching On Compressed Databases
19th Dec 2018 [2 years ago] from DeepSec
The goal of library and function identification is to find the original library and function to a given machine-code snippet. These snippets commonly arise from penetration tests attacking a remote executable, static malware analysis or...
ROOTS 2018 - The Swift Language From A Reverse Engineering Perspective
19th Dec 2018 [2 years ago] from DeepSec
Over the last decade, mobile devices have taken over the consumer market for computer hardware. Almost all these mobile devices run either Android or iOS as their operating systems. In 2014, Apple introduced the Swift programming language...
« Newer 1 2 3 4 5 6 7 8 Older »