Загрузка страницы

AppSecUSA 2016 - Keynote - Sammy Kamkar - The Less Hacked Path

Keynote - The Less Hacked Path

Since the dawn of the Internet and the Web, a broad series of hacking attack vectors have descended. Malicious hackers, researchers, and governments have demonstrated and deployed these attacks onto computers, mobile devices, and nuclear power plants. While we continue to build sophisticated technology to defend against many of these attacks, a new field of exciting research is taking place that uses side channels, physics, and low cost tools to employ powerful attacks against modern technology. We'll explore some of these fascinating, and often secretive, methods and how you can use them or secure against them.

Samy Kamkar is a privacy and security researcher, computer hacker, whistle blower and entrepreneur. At the age of 16, Kamkar dropped out of high school and one year later, co-founded Fonality, a unified communications company based on open source software, which raised over $46 million in private funding. He is possibly best known for creating and releasing the fastest spreading virus of all time, the MySpace worm Samy, and being subsequently raided for it by the United States Secret Service, under the Patriot Act. He is also known for creating SkyJack, a custom drone which hacks into any nearby Parrot drones allowing them to be controlled by its operator, and for creating the Evercookie, which appeared in a top-secret NSA document revealed by Edward Snowden and on the front page of The New York Times. He is also known for his work with The Wall Street Journal and his discovery of the illicit mobile phone tracking where the Apple iPhone, Google Android and Microsoft Windows Phone mobile devices transmit GPS and Wi-Fi information to their parent companies. His mobile research led to a series of class-action lawsuits against the companies and a privacy hearing on Capitol Hill.

-

Managed by the official OWASP Media Project https://www.owasp.org/index.php/OWASP_Media_Project

Видео AppSecUSA 2016 - Keynote - Sammy Kamkar - The Less Hacked Path канала OWASP Foundation
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
28 августа 2017 г. 1:27:35
00:59:10
Другие видео канала
WebAuthn: Strong Authentication vs Privacy vs Convenience - Suby RamanWebAuthn: Strong Authentication vs Privacy vs Convenience - Suby RamanGobal AppSec Dublin: Server Side Prototype Pollution - Gareth HeyesGobal AppSec Dublin: Server Side Prototype Pollution - Gareth HeyesOWASP Standard Classification: Threat Modeling the CI/CD Pipeline to Improve Softwar... - D. CornellOWASP Standard Classification: Threat Modeling the CI/CD Pipeline to Improve Softwar... - D. CornellOWASP DefectDojo Project - Timo Pagel & Stefan FleckensteinOWASP DefectDojo Project - Timo Pagel & Stefan FleckensteinTopics of Interest: Common NGINX Misconfigurations That Leave Your Web Server Open ... - S. PearlmanTopics of Interest: Common NGINX Misconfigurations That Leave Your Web Server Open ... - S. PearlmanDeserialization Vulnerability Remediation with Automated Gadget Chain Discovery - Ian HakenDeserialization Vulnerability Remediation with Automated Gadget Chain Discovery - Ian HakenAll our APIs are belong to us - Jad Boutros - AppSec California 2016All our APIs are belong to us - Jad Boutros - AppSec California 2016AppSec EU15 - Luca De Fulgentis - Windows Phone App Security For Builders And BreakersAppSec EU15 - Luca De Fulgentis - Windows Phone App Security For Builders And BreakersOWASP Flagship Projects: OWASP Dependency Track - Steve SpringettOWASP Flagship Projects: OWASP Dependency Track - Steve SpringettThreat Model-as-Code - Abhay Bhargav - AppSecUSA 2018Threat Model-as-Code - Abhay Bhargav - AppSecUSA 2018OWASP Flagship Projects: OWASP Dependency-Check - Jeremy LongOWASP Flagship Projects: OWASP Dependency-Check - Jeremy LongCreating a Security Policy Framework   That works   Isaac PainterCreating a Security Policy Framework That works Isaac PainterEverything You Wanted to Know About Client side CSRF But Were Afraid to Ask - Soheil KhodayariEverything You Wanted to Know About Client side CSRF But Were Afraid to Ask - Soheil KhodayariOWASP Juice Shop Project - Björn KimminichOWASP Juice Shop Project - Björn KimminichFederated Login CSRF - AppSecUSA 2017Federated Login CSRF - AppSecUSA 2017Global AppSec Dublin: Developer Driven Security In High-Growth Environments - Jakub KaluznyGlobal AppSec Dublin: Developer Driven Security In High-Growth Environments - Jakub KaluznyOWASP AppSec Europe 2014 - DevOps TrackOWASP AppSec Europe 2014 - DevOps TrackGlobal AppSec Dublin: Automated Security Testing With OWASP Nettacker - Sam StepanyanGlobal AppSec Dublin: Automated Security Testing With OWASP Nettacker - Sam StepanyanExhibitor: Flipping the Script on Application Security - Isaac CohenExhibitor: Flipping the Script on Application Security - Isaac CohenKeynote: Applying Security Engineering Principles to Complex Composite Systems - Neal ZiringKeynote: Applying Security Engineering Principles to Complex Composite Systems - Neal ZiringLayered Threat Modeling   An Architectural Approach - Michael BoeynaemsLayered Threat Modeling An Architectural Approach - Michael Boeynaems
Яндекс.Метрика