HOME
ABOUT
TRAINING
CXO BRIEF
CONFERENCE
TICKETS
MERCHANDISE
POSTS
CONTACT US
More
0
All Posts
Talks
Workshops
Training
Kampung (Village)
CTF
Electronic Badge
Today I Learned
Search
Deep Dive Into postMessage Security — by Tatiana Mikhailova
Automating & Tooling Your Own CAN Hacking Tool On a Cheap Car Hacking Adventure — by Jay Turla
Confirming Red Alerts — Taking Over & Compromising ICS & SCADA — by Mars Cheng & Selmon Yang
Offensive Defense In the IT & ICS/OT Convergence — by Mike Rebultan
Bug Hunting: Mobile Apps — From Setup to Bugs — by Sebastian Wieseler
Silicon Biometrics — A Novel Approach to Solve Digital Identify Fraud — by Shantanu Bhattacharya
JSON Web Token (JWT) Security: Attacking the Guardian — by Shivam Bathla
Reverse Engineering Android Native Libraries — by Terry Chia
Tracking BlackTech Activities — Attacks to What You Trust & Blind Your Defense — by CK Chen & Minsky
Obtaining 800,000 Windows Binaries via Windows Update — by Aliz Hammond
Application Insecurity with Android Virtual Containers — by Gautam Arvind Pandian & Vikas Gupta
Zero to Millionaire in 60 minutes: Hacking Real Life Financial Applications
Qiling Framework: Instrument the Impossibilities — by KaiJern (xwings) Lau, Kong ZiQiao & Wu ChenXu
Who Stole My $100,000's Worth Bitcoin Wallets — Catch Them All with New Deceptive Bait
Car Security Diary: Our Connected Vehicle Journey — by Car Security Quarter (CSQ)
SINCON 2020 Conference Keynote — Cyber Immunity for Cyber Age — by Eugene Kaspersky
SINCON 2020 Conference Keynote — Hack for Good: Why the Future Needs Hackers — by Alex Rice
Office IoT: The Elephant In the Room — by Quentyn Taylor
Do You See What They See? Asset Discovery In the Age of Security Automation — by Isaac Dawson
P@ssword Making & Breaking — by Will Hunt
1
2
3
4