Windows Memory Forensics
Aside from further development of traditional forensic techniques which involve post-mortem hard disk analysis, in the last couple of years the field of computer forensics has been marked by significant […]
SCADA Strangelove

How I Learned to Start Worrying and Love Nuclear Plants Modern civilization unconditionally depends on information systems. It is paradoxical but true that ICS/SCADA systems are the most insecure systems […]
Further Hacks on the Calypso Platform
OR How to Turn a Phone into a BTS The calypso baseband and its companion chips are used on the Motorola C123 among other and are now well known for […]
Securing the Campaign

Security and the 2012 US Presidential Election This talk will go into some of challenges, solutions, and stories from securing a campaign for the 2012 US presidential election. Persons: Ben […]
Hacking Cisco Phones
Just because you are paranoid doesn’t mean your phone isn’t listening to everything you say We discuss a set of 0-day kernel vulnerabilities in CNU (Cisco Native Unix), the operating […]
Setting Mobile Phones Free

An overview of a mobile telephony market and how a community-driven operator is born In The Netherlands, this year the community-driven mobile telco Limesco has started operations. We’re providing voice, […]