Skip to main content

HITB

Hacker Unlocks 'God Mode' and Shares the 'Key'

posted onAugust 14, 2018
by l33tdawg
Credit: HITBGSEC

L33tdawg: Christopher will also be at #HITBGSEC Singapore at the end of August.

When a room filled with hundreds of security professionals erupts into applause, it's notable. When that happens less than five minutes into a presentation, it's remarkable. But that's what transpired when security researcher Christopher Domas last week showed a room at Black Hat USA how to break the so-called ring-privilege model of modern CPU security.

HITB and JD.com Announce Collaboration for HITB Security Conference in China
Credit: HITBSecConf

HITB, organizer of the popular HITB Security Conference series, is collaborating with JD.com, China’s largest retailer, to bring its popular HITB Security Conference to China for the first time later this year.

l33tdawg Thu, 08/02/2018 - 00:06 hitb2018pek HITB China Industry News

Facebook's Alex Stamos called for huge changes to solve the company’s problems in a leaked memo

posted onJuly 24, 2018
by l33tdawg

L33tdawg: We are proud to have Alex keynoting for us next year at #HITB2019AMS! Our 10th year anniversary HITB Security Conference in Amsterdam!

Alex Stamos, Facebook’s head of security, called for radical overhaul in how Facebook operates in a leaked memo from March 2018, as the company reeled from a chain of ugly scandals.

China Has Some Of The Best Hackers In The World. Its Government Wants To Keep Them There.

posted onJune 5, 2018
by l33tdawg

L33tdawg: See you guys at HITBSecConf2018 - Beijing on November 1st and 2nd :)

At first glance, you couldn’t see much of a difference between DEF CON, the notoriously rowdy American hacker conference, and its newly formed franchise in Beijing, where in May China hosted its first hacker conference.

Your logo and branded vulnerability aren't helping: How to disclose better

posted onMay 27, 2018
by l33tdawg

In 2000, I leapt out of journalism and in to security communications. I was relocating to the San Francisco Bay Area and, despite the downturn, tech was king. I also wanted to lend my unique albeit non-technical skill set to a technology that protected people or, at the very least, attempted to reduce harm caused by malicious behavior.

Industry CMO on the Downstream Risks of "Logo Disclosures"

posted onMay 2, 2018
by l33tdawg

Jennifer Leggio, chief marketing officer at Flashpoint, is an executive with more than a decade's experience in managing corporate cyber security marketing at the highest levels -- much of the time seeking and advocating a greater ethical stance in marketing. At last month's Hack in the Box Conference in Amsterdam, she delivered a keynote presentation entitled, 'A Risk Assessment of Logo Disclosures'.

How Android Phones Hide Missed Security Updates From You

posted onApril 24, 2018
by l33tdawg

Google has long struggled with how best to get dozens of Android smartphone manufacturers—and hundreds of carriers—to regularly push out security-focused software updates. But when one German security firm looked under the hood of hundreds of Android phones, it found a troubling new wrinkle: Not only do many Android phone vendors fail to make patches available to their users, or delay their release for months; they sometimes also tell users their phone's firmware is fully up to date, even while they've secretly skipped patches.

Establishing covert communication channels by abusing GSM AT commands

posted onApril 5, 2018
by l33tdawg

Security research often starts as a hobby project, and Alfonso Muñoz’s and Jorge Cuadrado’s probe into mobile privacy is no exception.

The duo, who’s scheduled to reveal the results of their research at the Hack in the Box Conference in Amsterdam next week, ended up finding a way to establishing covert communication channels over GSM by abusing GSM AT commands.