Skip to main content

HITB2013AMS

Electric Cars: Booming Sales Prompt Power Grid Cyber Attack Concerns

posted onFebruary 27, 2014
by l33tdawg

Electric cars are attracting more buyers than ever before. Although the now more sporting looking vehicles may be better for the environment, they pose a great risk to the power grid. Not only are power grid segments in some cities already too overly burdened to sustain increased usage by a multitude of charging electric cars, the “refueling” stations themselves are reportedly extremely susceptible to cyber hacking.

Anatomy of a killer bug: How just 5 characters can murder iPhone, Mac apps

posted onSeptember 4, 2013
by l33tdawg

There has been much sniggering into sleeves after wags found they could upset iOS 6 iPhones and iPads, and Macs running OS X 10.8, by sending a simple rogue text message or email.

A bug is triggered when the CoreText component in the vulnerable Apple operating systems tries to render on screen a particular sequence of Unicode characters: the kernel reacts by killing the running program, be it your web browser, message client, Twitter app or whatever tried to use CoreText to display the naughty string.

"Hackers for Hire" NATO video enters vulnerability disclosure debate

posted onJuly 29, 2013
by l33tdawg

L33tdawg: An interview with Microsoft's Katie Moussouris shot at #HITB2013AMS in May.

NATO has released a short video, looking at the “hacker” phenomenon.

By hackers they aren’t just talking about the stereotypical malicious hacker, bent over a keyboard in a darkened room while wearing a hoody (although one of them does appear in the video), but also vulnerability researchers who find security holes in systems.

How big data is transforming information security

posted onJune 26, 2013
by l33tdawg

In this video recorded at Hack In The Box 2013 Amsterdam, Eddie Schwartz, CSO at RSA, The Security Division of EMC, discusses the impact of big data on information security. He talks about security management, fraud, identity management, governance, risk and compliance.

HITB Publishes Full Videos of All #HITB2013AMS Talks

posted onJune 10, 2013
by l33tdawg

The organizers of the Hack In The Box (HITB) security conference have managed to publish the complete videos of all the talks from #HITB2013AMS.

So, in case you haven’t made it to the conference, or if you want to take another look at one of the many interesting presentations, check out the official HITB YouTube channel.

Daniel Mende Shows How Canon Cameras Can Be Hacked

posted onMay 30, 2013
by l33tdawg

Back in April, we attended the 2013 Amsterdam edition of the Hack in the Box (HITB) security conference. One of the many interesting presentations was made by ERNW security researcher Daniel Mende, who demonstrated how high-end cameras can be remotely hacked.

Mende showed the audience several ways in which hackers can access the information stored on Canon EOS 1DX cameras, a model utilized by many professionals, including Reuters journalists.

Mass Customized Attacks Show Malware Maturity

posted onMay 20, 2013
by l33tdawg

L33tdawg: Video of their talk from #HITB2013AMS is available on YouTube.

Products frequently follow a trajectory from customized prototypes to mass-produced goods, and -- when the market matures -- manufacturers typically find ways to lure consumers by allowing efficient customization.

How to hack an electric car-charging station

posted onMay 20, 2013
by l33tdawg

Is there anything more annoying than infrastructure that turns on you?

For years we've been warned about the specter of hacker-induced nuclear power plant meltdowns, breached electric-grid control systems or Samsung TVs that let hackers watch you. We've even heard we could lose our data to juicejacking, when all we want is an emergency phone charge.

Edward Schwartz's Keynote at #HITB2013AMS - Video

posted onMay 14, 2013
by l33tdawg

L33tdawg: Slides and presentation materials can be found at http://conference.hitb.org/hitbsecconf2013ams/materials/

The organizers of the Hack in the Box conference have started publishing the complete videos of the presentations held at this year’s Amsterdam edition.

A lot of renowned experts have taken part this year, so if you weren’t able to make it in person, you can check out the official videos.