際際滷shows by User: SOURCEConference / http://www.slideshare.net/images/logo.gif 際際滷shows by User: SOURCEConference / Fri, 30 May 2014 12:18:56 GMT 際際滷Share feed for 際際滷shows by User: SOURCEConference Million Browser Botnet /slideshow/million-browser-botnet-35310566/35310566 mbbsourcedublin14-140530121856-phpapp02
Matt Johansen, White Hat - Online advertising networks can be a web hackers best friend. For mere pennies per thousand impressions (that means browsers) there are service providers who allow you to broadly distribute arbitrary javascript -- even malicious javascript! You are SUPPOSED to use this feature to show ads, to track users, and get clicks, but that doesnt mean you have to abide. Absolutely nothing prevents spending $10, $100, or more to create a massive javascript-driven browser botnet instantly. The real-world power is spooky cool. We know, because we tested it in-the-wild. ]]>

Matt Johansen, White Hat - Online advertising networks can be a web hackers best friend. For mere pennies per thousand impressions (that means browsers) there are service providers who allow you to broadly distribute arbitrary javascript -- even malicious javascript! You are SUPPOSED to use this feature to show ads, to track users, and get clicks, but that doesnt mean you have to abide. Absolutely nothing prevents spending $10, $100, or more to create a massive javascript-driven browser botnet instantly. The real-world power is spooky cool. We know, because we tested it in-the-wild. ]]>
Fri, 30 May 2014 12:18:56 GMT /slideshow/million-browser-botnet-35310566/35310566 SOURCEConference@slideshare.net(SOURCEConference) Million Browser Botnet SOURCEConference Matt Johansen, White Hat - Online advertising networks can be a web hackers best friend. For mere pennies per thousand impressions (that means browsers) there are service providers who allow you to broadly distribute arbitrary javascript -- even malicious javascript! You are SUPPOSED to use this feature to show ads, to track users, and get clicks, but that doesnt mean you have to abide. Absolutely nothing prevents spending $10, $100, or more to create a massive javascript-driven browser botnet instantly. The real-world power is spooky cool. We know, because we tested it in-the-wild. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mbbsourcedublin14-140530121856-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Matt Johansen, White Hat - Online advertising networks can be a web hackers best friend. For mere pennies per thousand impressions (that means browsers) there are service providers who allow you to broadly distribute arbitrary javascript -- even malicious javascript! You are SUPPOSED to use this feature to show ads, to track users, and get clicks, but that doesnt mean you have to abide. Absolutely nothing prevents spending $10, $100, or more to create a massive javascript-driven browser botnet instantly. The real-world power is spooky cool. We know, because we tested it in-the-wild.
Million Browser Botnet from Source Conference
]]>
2395 5 https://cdn.slidesharecdn.com/ss_thumbnails/mbbsourcedublin14-140530121856-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
iBanking - a botnet on Android /slideshow/i-banking-a-botnet-on-android-may-23rd/35310554 ibanking-abotnetonandroidmay23rd-140530121839-phpapp01
Stephen Doherty, Symantec - iBanking is a relative newcomer to the mobile malware scene whose use was first identified in August of 2013. The Trojan targets Android devices and can be remotely controlled over SMS and HTTP. iBanking began life as a simple SMS stealer and call redirector, but has undergone significant development since then. iBanking is available for purchase on a private underground forum for between $4k - $5k, with the next release expected to include a 0-day exploit for the Android operating system. This presentation will discuss iBanking - it's capabilities and the reasons for targeting mobile devices. ]]>

Stephen Doherty, Symantec - iBanking is a relative newcomer to the mobile malware scene whose use was first identified in August of 2013. The Trojan targets Android devices and can be remotely controlled over SMS and HTTP. iBanking began life as a simple SMS stealer and call redirector, but has undergone significant development since then. iBanking is available for purchase on a private underground forum for between $4k - $5k, with the next release expected to include a 0-day exploit for the Android operating system. This presentation will discuss iBanking - it's capabilities and the reasons for targeting mobile devices. ]]>
Fri, 30 May 2014 12:18:39 GMT /slideshow/i-banking-a-botnet-on-android-may-23rd/35310554 SOURCEConference@slideshare.net(SOURCEConference) iBanking - a botnet on Android SOURCEConference Stephen Doherty, Symantec - iBanking is a relative newcomer to the mobile malware scene whose use was first identified in August of 2013. The Trojan targets Android devices and can be remotely controlled over SMS and HTTP. iBanking began life as a simple SMS stealer and call redirector, but has undergone significant development since then. iBanking is available for purchase on a private underground forum for between $4k - $5k, with the next release expected to include a 0-day exploit for the Android operating system. This presentation will discuss iBanking - it's capabilities and the reasons for targeting mobile devices. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ibanking-abotnetonandroidmay23rd-140530121839-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Stephen Doherty, Symantec - iBanking is a relative newcomer to the mobile malware scene whose use was first identified in August of 2013. The Trojan targets Android devices and can be remotely controlled over SMS and HTTP. iBanking began life as a simple SMS stealer and call redirector, but has undergone significant development since then. iBanking is available for purchase on a private underground forum for between $4k - $5k, with the next release expected to include a 0-day exploit for the Android operating system. This presentation will discuss iBanking - it&#39;s capabilities and the reasons for targeting mobile devices.
iBanking - a botnet on Android from Source Conference
]]>
2600 6 https://cdn.slidesharecdn.com/ss_thumbnails/ibanking-abotnetonandroidmay23rd-140530121839-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
I want the next generation web here SPDY QUIC /SOURCEConference/i-want-the-next-generation-web-here-spdy-quic iwantthenextgenerationwebherespdyquic-140530121837-phpapp01
Matt Summers, NCC Group - Web technology has changed a lot in the last 25 years but the underlying transport mechanism has stayed the same. The web we have today was not designed for the plethora of new device types and communication methods but things are changing and you probably dont even know it. You probably dont even notice the problem because it is so ingrained. In this presentation we are going to delve into the problems with the web and how we use it today. We will also take an in depth look at the proposed solutions for the next generation web and the implications that come with it. ]]>

Matt Summers, NCC Group - Web technology has changed a lot in the last 25 years but the underlying transport mechanism has stayed the same. The web we have today was not designed for the plethora of new device types and communication methods but things are changing and you probably dont even know it. You probably dont even notice the problem because it is so ingrained. In this presentation we are going to delve into the problems with the web and how we use it today. We will also take an in depth look at the proposed solutions for the next generation web and the implications that come with it. ]]>
Fri, 30 May 2014 12:18:37 GMT /SOURCEConference/i-want-the-next-generation-web-here-spdy-quic SOURCEConference@slideshare.net(SOURCEConference) I want the next generation web here SPDY QUIC SOURCEConference Matt Summers, NCC Group - Web technology has changed a lot in the last 25 years but the underlying transport mechanism has stayed the same. The web we have today was not designed for the plethora of new device types and communication methods but things are changing and you probably dont even know it. You probably dont even notice the problem because it is so ingrained. In this presentation we are going to delve into the problems with the web and how we use it today. We will also take an in depth look at the proposed solutions for the next generation web and the implications that come with it. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/iwantthenextgenerationwebherespdyquic-140530121837-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Matt Summers, NCC Group - Web technology has changed a lot in the last 25 years but the underlying transport mechanism has stayed the same. The web we have today was not designed for the plethora of new device types and communication methods but things are changing and you probably dont even know it. You probably dont even notice the problem because it is so ingrained. In this presentation we are going to delve into the problems with the web and how we use it today. We will also take an in depth look at the proposed solutions for the next generation web and the implications that come with it.
I want the next generation web here SPDY QUIC from Source Conference
]]>
1358 2 https://cdn.slidesharecdn.com/ss_thumbnails/iwantthenextgenerationwebherespdyquic-140530121837-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
From DNA Sequence Variation to .NET Bits and Bobs /slideshow/fromdna-sequence-variation-to-net-bits-and-bobs/35172330 fromdnasequencevariationtonetbitsandbobs-notes-140527102025-phpapp01
Mathieu Letourneau, Andrei Saygo, Eoin Ward, Microsoft This talk will present our research project on .Net file clustering based on their respective basic blocks and the parallel that can be made with DNA sequence variation analysis. We implemented a system that extracts the basic blocks on each file and creates clusters based on them. We also developed an IDA plugin to make use of that data and speed up our analysis of .Net files. Andrei Saygo, Eoin Ward and Mathieu Letourneau all work as Anti-Malware Security Engineers in the AM Scan team of Microsofts Product Release & Security Services group in Dublin, Ireland. ]]>

Mathieu Letourneau, Andrei Saygo, Eoin Ward, Microsoft This talk will present our research project on .Net file clustering based on their respective basic blocks and the parallel that can be made with DNA sequence variation analysis. We implemented a system that extracts the basic blocks on each file and creates clusters based on them. We also developed an IDA plugin to make use of that data and speed up our analysis of .Net files. Andrei Saygo, Eoin Ward and Mathieu Letourneau all work as Anti-Malware Security Engineers in the AM Scan team of Microsofts Product Release & Security Services group in Dublin, Ireland. ]]>
Tue, 27 May 2014 10:20:25 GMT /slideshow/fromdna-sequence-variation-to-net-bits-and-bobs/35172330 SOURCEConference@slideshare.net(SOURCEConference) From DNA Sequence Variation to .NET Bits and Bobs SOURCEConference Mathieu Letourneau, Andrei Saygo, Eoin Ward, Microsoft This talk will present our research project on .Net file clustering based on their respective basic blocks and the parallel that can be made with DNA sequence variation analysis. We implemented a system that extracts the basic blocks on each file and creates clusters based on them. We also developed an IDA plugin to make use of that data and speed up our analysis of .Net files. Andrei Saygo, Eoin Ward and Mathieu Letourneau all work as Anti-Malware Security Engineers in the AM Scan team of Microsofts Product Release & Security Services group in Dublin, Ireland. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fromdnasequencevariationtonetbitsandbobs-notes-140527102025-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Mathieu Letourneau, Andrei Saygo, Eoin Ward, Microsoft This talk will present our research project on .Net file clustering based on their respective basic blocks and the parallel that can be made with DNA sequence variation analysis. We implemented a system that extracts the basic blocks on each file and creates clusters based on them. We also developed an IDA plugin to make use of that data and speed up our analysis of .Net files. Andrei Saygo, Eoin Ward and Mathieu Letourneau all work as Anti-Malware Security Engineers in the AM Scan team of Microsofts Product Release &amp; Security Services group in Dublin, Ireland.
From DNA Sequence Variation to .NET Bits and Bobs from Source Conference
]]>
1242 4 https://cdn.slidesharecdn.com/ss_thumbnails/fromdnasequencevariationtonetbitsandbobs-notes-140527102025-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Extracting Forensic Information From Zeus Derivatives /slideshow/extracting-forensic-information-from-zeus-derivatives/35172324 extractingforensicinformationfromzeusderivatives-140527102023-phpapp01
Extracting Forensic Information from Zeus Derivatives James Wyke, Sophos ]]>

Extracting Forensic Information from Zeus Derivatives James Wyke, Sophos ]]>
Tue, 27 May 2014 10:20:23 GMT /slideshow/extracting-forensic-information-from-zeus-derivatives/35172324 SOURCEConference@slideshare.net(SOURCEConference) Extracting Forensic Information From Zeus Derivatives SOURCEConference Extracting Forensic Information from Zeus Derivatives James Wyke, Sophos <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/extractingforensicinformationfromzeusderivatives-140527102023-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Extracting Forensic Information from Zeus Derivatives James Wyke, Sophos
Extracting Forensic Information From Zeus Derivatives from Source Conference
]]>
3434 2 https://cdn.slidesharecdn.com/ss_thumbnails/extractingforensicinformationfromzeusderivatives-140527102023-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to Like Social Media Network Security /slideshow/brian-honan-source-dub-2014/35172323 brianhonansourcedub2014-140527102022-phpapp02
Brian Honan, IRISSCERT Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way. Brian Honan is an independent security consultant based in Dublin, Ireland, and is the founder and head of IRISSCERT, Ireland's first CERT. He is a Special Advisor to Europol's Cybercrime Centre (EC3), an adjunct lecturer on Information Security in University College Dublin. He is the author of the book "ISO 27001 in a Windows Environment" and co-author of "The Cloud Security Rules", and regularly speaks at major industry conferences. In 2013 Brian was awarded SC Magazine's Information Security Person of the year for his contribution to the computer security industry. ]]>

Brian Honan, IRISSCERT Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way. Brian Honan is an independent security consultant based in Dublin, Ireland, and is the founder and head of IRISSCERT, Ireland's first CERT. He is a Special Advisor to Europol's Cybercrime Centre (EC3), an adjunct lecturer on Information Security in University College Dublin. He is the author of the book "ISO 27001 in a Windows Environment" and co-author of "The Cloud Security Rules", and regularly speaks at major industry conferences. In 2013 Brian was awarded SC Magazine's Information Security Person of the year for his contribution to the computer security industry. ]]>
Tue, 27 May 2014 10:20:22 GMT /slideshow/brian-honan-source-dub-2014/35172323 SOURCEConference@slideshare.net(SOURCEConference) How to Like Social Media Network Security SOURCEConference Brian Honan, IRISSCERT Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way. Brian Honan is an independent security consultant based in Dublin, Ireland, and is the founder and head of IRISSCERT, Ireland's first CERT. He is a Special Advisor to Europol's Cybercrime Centre (EC3), an adjunct lecturer on Information Security in University College Dublin. He is the author of the book "ISO 27001 in a Windows Environment" and co-author of "The Cloud Security Rules", and regularly speaks at major industry conferences. In 2013 Brian was awarded SC Magazine's Information Security Person of the year for his contribution to the computer security industry. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/brianhonansourcedub2014-140527102022-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Brian Honan, IRISSCERT Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way. Brian Honan is an independent security consultant based in Dublin, Ireland, and is the founder and head of IRISSCERT, Ireland&#39;s first CERT. He is a Special Advisor to Europol&#39;s Cybercrime Centre (EC3), an adjunct lecturer on Information Security in University College Dublin. He is the author of the book &quot;ISO 27001 in a Windows Environment&quot; and co-author of &quot;The Cloud Security Rules&quot;, and regularly speaks at major industry conferences. In 2013 Brian was awarded SC Magazine&#39;s Information Security Person of the year for his contribution to the computer security industry.
How to Like Social Media Network Security from Source Conference
]]>
1006 2 https://cdn.slidesharecdn.com/ss_thumbnails/brianhonansourcedub2014-140527102022-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Wfuzz para Penetration Testers /slideshow/wfuzz-para-penetration-testers/10363880 wfuzzforpentester2011-111128062656-phpapp01
SOURCE Barcelona 2011 - Christian Martorella & Xavier Mendez]]>

SOURCE Barcelona 2011 - Christian Martorella & Xavier Mendez]]>
Mon, 28 Nov 2011 06:26:55 GMT /slideshow/wfuzz-para-penetration-testers/10363880 SOURCEConference@slideshare.net(SOURCEConference) Wfuzz para Penetration Testers SOURCEConference SOURCE Barcelona 2011 - Christian Martorella & Xavier Mendez <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wfuzzforpentester2011-111128062656-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SOURCE Barcelona 2011 - Christian Martorella &amp; Xavier Mendez
Wfuzz para Penetration Testers from Source Conference
]]>
8151 10 https://cdn.slidesharecdn.com/ss_thumbnails/wfuzzforpentester2011-111128062656-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security Goodness with Ruby on Rails /SOURCEConference/security-goodnesswithrorv2 securitygoodnesswithrorv2-111128062654-phpapp01
SOURCE Barcelona 2011 - Daniel Pelaez]]>

SOURCE Barcelona 2011 - Daniel Pelaez]]>
Mon, 28 Nov 2011 06:26:52 GMT /SOURCEConference/security-goodnesswithrorv2 SOURCEConference@slideshare.net(SOURCEConference) Security Goodness with Ruby on Rails SOURCEConference SOURCE Barcelona 2011 - Daniel Pelaez <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securitygoodnesswithrorv2-111128062654-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SOURCE Barcelona 2011 - Daniel Pelaez
Security Goodness with Ruby on Rails from Source Conference
]]>
2521 8 https://cdn.slidesharecdn.com/ss_thumbnails/securitygoodnesswithrorv2-111128062654-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Securty Testing For RESTful Applications /slideshow/security-testing-for-rest-applications-ofer-shezaf-source-barcelona-nov-2011/10363878 securitytestingforrestapplicationsofershezafsourcebarcelonanov2011-111128062653-phpapp01
SOURCE Barcelona 2011 - Ofer Shezaf]]>

SOURCE Barcelona 2011 - Ofer Shezaf]]>
Mon, 28 Nov 2011 06:26:51 GMT /slideshow/security-testing-for-rest-applications-ofer-shezaf-source-barcelona-nov-2011/10363878 SOURCEConference@slideshare.net(SOURCEConference) Securty Testing For RESTful Applications SOURCEConference SOURCE Barcelona 2011 - Ofer Shezaf <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securitytestingforrestapplicationsofershezafsourcebarcelonanov2011-111128062653-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SOURCE Barcelona 2011 - Ofer Shezaf
Securty Testing For RESTful Applications from Source Conference
]]>
15244 10 https://cdn.slidesharecdn.com/ss_thumbnails/securitytestingforrestapplicationsofershezafsourcebarcelonanov2011-111128062653-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Esteganografia https://es.slideshare.net/slideshow/presentacion-10363876/10363876 presentacion-111128062652-phpapp02
SOURCE Barcelona 2011 - Jordi Serra-Ruiz]]>

SOURCE Barcelona 2011 - Jordi Serra-Ruiz]]>
Mon, 28 Nov 2011 06:26:50 GMT https://es.slideshare.net/slideshow/presentacion-10363876/10363876 SOURCEConference@slideshare.net(SOURCEConference) Esteganografia SOURCEConference SOURCE Barcelona 2011 - Jordi Serra-Ruiz <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentacion-111128062652-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SOURCE Barcelona 2011 - Jordi Serra-Ruiz
from Source Conference
]]>
1389 8 https://cdn.slidesharecdn.com/ss_thumbnails/presentacion-111128062652-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Men in the Server Meet the Man in the Browser /slideshow/men-in-the-server-meet-the-man-in/10363870 menintheservermeetthemanin-111128062645-phpapp01
SOURCE Barcelona 2011 - Amichai Shulman]]>

SOURCE Barcelona 2011 - Amichai Shulman]]>
Mon, 28 Nov 2011 06:26:44 GMT /slideshow/men-in-the-server-meet-the-man-in/10363870 SOURCEConference@slideshare.net(SOURCEConference) Men in the Server Meet the Man in the Browser SOURCEConference SOURCE Barcelona 2011 - Amichai Shulman <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/menintheservermeetthemanin-111128062645-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SOURCE Barcelona 2011 - Amichai Shulman
Men in the Server Meet the Man in the Browser from Source Conference
]]>
1148 4 https://cdn.slidesharecdn.com/ss_thumbnails/menintheservermeetthemanin-111128062645-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Advanced Data Exfiltration The Way Q Would Have Done It /SOURCEConference/data-exfiltration-sourcebcn2011 dataexfiltration-sourcebcn2011-111128062647-phpapp02
SOURCE Barcelona 2011 - Iftach Ian Amit]]>

SOURCE Barcelona 2011 - Iftach Ian Amit]]>
Mon, 28 Nov 2011 06:26:43 GMT /SOURCEConference/data-exfiltration-sourcebcn2011 SOURCEConference@slideshare.net(SOURCEConference) Advanced Data Exfiltration The Way Q Would Have Done It SOURCEConference SOURCE Barcelona 2011 - Iftach Ian Amit <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dataexfiltration-sourcebcn2011-111128062647-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SOURCE Barcelona 2011 - Iftach Ian Amit
Advanced Data Exfiltration The Way Q Would Have Done It from Source Conference
]]>
751 4 https://cdn.slidesharecdn.com/ss_thumbnails/dataexfiltration-sourcebcn2011-111128062647-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Adapting To The Age Of Anonymous /slideshow/corman-source-bcn2011compressed/10363863 cormansourcebcn2011compressed-111128062643-phpapp01
SOURCE Barcelona 2011 - Joshua Corman]]>

SOURCE Barcelona 2011 - Joshua Corman]]>
Mon, 28 Nov 2011 06:26:41 GMT /slideshow/corman-source-bcn2011compressed/10363863 SOURCEConference@slideshare.net(SOURCEConference) Adapting To The Age Of Anonymous SOURCEConference SOURCE Barcelona 2011 - Joshua Corman <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cormansourcebcn2011compressed-111128062643-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SOURCE Barcelona 2011 - Joshua Corman
Adapting To The Age Of Anonymous from Source Conference
]]>
908 6 https://cdn.slidesharecdn.com/ss_thumbnails/cormansourcebcn2011compressed-111128062643-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Are Agile And Secure Development Mutually Exclusive? /slideshow/are-agile-and-secure-development-mutually-exclusive-source-2011/10363861 areagileandsecuredevelopmentmutuallyexclusive-source2011-111128062641-phpapp01
SOURCE Barcelona 2011 - Matt Bartoldus]]>

SOURCE Barcelona 2011 - Matt Bartoldus]]>
Mon, 28 Nov 2011 06:26:38 GMT /slideshow/are-agile-and-secure-development-mutually-exclusive-source-2011/10363861 SOURCEConference@slideshare.net(SOURCEConference) Are Agile And Secure Development Mutually Exclusive? SOURCEConference SOURCE Barcelona 2011 - Matt Bartoldus <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/areagileandsecuredevelopmentmutuallyexclusive-source2011-111128062641-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SOURCE Barcelona 2011 - Matt Bartoldus
Are Agile And Secure Development Mutually Exclusive? from Source Conference
]]>
2392 9 https://cdn.slidesharecdn.com/ss_thumbnails/areagileandsecuredevelopmentmutuallyexclusive-source2011-111128062641-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Advanced (persistent) binary planting /slideshow/advanced-persistent-binary-planting/10363860 advancedpersistentbinaryplanting-111128062640-phpapp02
SOURCE Barcelona 2011 - Mitja Kolsex]]>

SOURCE Barcelona 2011 - Mitja Kolsex]]>
Mon, 28 Nov 2011 06:26:37 GMT /slideshow/advanced-persistent-binary-planting/10363860 SOURCEConference@slideshare.net(SOURCEConference) Advanced (persistent) binary planting SOURCEConference SOURCE Barcelona 2011 - Mitja Kolsex <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/advancedpersistentbinaryplanting-111128062640-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SOURCE Barcelona 2011 - Mitja Kolsex
Advanced (persistent) binary planting from Source Conference
]]>
1216 4 https://cdn.slidesharecdn.com/ss_thumbnails/advancedpersistentbinaryplanting-111128062640-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Legal/technical strategies addressing data risks as perimeter shifts to Cloud /SOURCEConference/snead-bukhari-preso sneadbukharipreso-111128062639-phpapp02
SOURCE Barcelona 2011 - David Snead & Nadeem Bukhari]]>

SOURCE Barcelona 2011 - David Snead & Nadeem Bukhari]]>
Mon, 28 Nov 2011 06:26:37 GMT /SOURCEConference/snead-bukhari-preso SOURCEConference@slideshare.net(SOURCEConference) Legal/technical strategies addressing data risks as perimeter shifts to Cloud SOURCEConference SOURCE Barcelona 2011 - David Snead & Nadeem Bukhari <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sneadbukharipreso-111128062639-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SOURCE Barcelona 2011 - David Snead &amp; Nadeem Bukhari
Legal/technical strategies addressing data risks as perimeter shifts to Cloud from Source Conference
]]>
1998 3 https://cdn.slidesharecdn.com/ss_thumbnails/sneadbukharipreso-111128062639-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Who should the security team hire next? /slideshow/who-should-the-security-team-hire-next/8553870 source-final-handout-110709184718-phpapp02
SOURCE Seattle 2011 - Myles Conley]]>

SOURCE Seattle 2011 - Myles Conley]]>
Sat, 09 Jul 2011 18:47:16 GMT /slideshow/who-should-the-security-team-hire-next/8553870 SOURCEConference@slideshare.net(SOURCEConference) Who should the security team hire next? SOURCEConference SOURCE Seattle 2011 - Myles Conley <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/source-final-handout-110709184718-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SOURCE Seattle 2011 - Myles Conley
Who should the security team hire next? from Source Conference
]]>
840 2 https://cdn.slidesharecdn.com/ss_thumbnails/source-final-handout-110709184718-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Latest Developments in Computer Crime Law /slideshow/the-latest-developments-in-computer-crime-law/8354808 hofmannsourceslides-110619130601-phpapp01
SOURCE Seattle 2011 - Marcia Hofmann]]>

SOURCE Seattle 2011 - Marcia Hofmann]]>
Sun, 19 Jun 2011 13:05:56 GMT /slideshow/the-latest-developments-in-computer-crime-law/8354808 SOURCEConference@slideshare.net(SOURCEConference) The Latest Developments in Computer Crime Law SOURCEConference SOURCE Seattle 2011 - Marcia Hofmann <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hofmannsourceslides-110619130601-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SOURCE Seattle 2011 - Marcia Hofmann
The Latest Developments in Computer Crime Law from Source Conference
]]>
1539 3 https://cdn.slidesharecdn.com/ss_thumbnails/hofmannsourceslides-110619130601-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
JSF Security /slideshow/jsf-security/8354803 jsfsecurityv0-1-110619130504-phpapp02
SOURCE Seattle 2011 - Krishna Raja]]>

SOURCE Seattle 2011 - Krishna Raja]]>
Sun, 19 Jun 2011 13:04:58 GMT /slideshow/jsf-security/8354803 SOURCEConference@slideshare.net(SOURCEConference) JSF Security SOURCEConference SOURCE Seattle 2011 - Krishna Raja <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/jsfsecurityv0-1-110619130504-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SOURCE Seattle 2011 - Krishna Raja
JSF Security from Source Conference
]]>
5283 5 https://cdn.slidesharecdn.com/ss_thumbnails/jsfsecurityv0-1-110619130504-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How To: Find The Right Amount Of Security Spend /slideshow/how-much-security/8338734 howmuchsecurity-110617113255-phpapp02
SOURCE Seattle 2011 - Jared Pfost]]>

SOURCE Seattle 2011 - Jared Pfost]]>
Fri, 17 Jun 2011 11:32:52 GMT /slideshow/how-much-security/8338734 SOURCEConference@slideshare.net(SOURCEConference) How To: Find The Right Amount Of Security Spend SOURCEConference SOURCE Seattle 2011 - Jared Pfost <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/howmuchsecurity-110617113255-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SOURCE Seattle 2011 - Jared Pfost
How To: Find The Right Amount Of Security Spend from Source Conference
]]>
1150 3 https://cdn.slidesharecdn.com/ss_thumbnails/howmuchsecurity-110617113255-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-SOURCEConference-48x48.jpg?cb=1571500449 www.sourceconference.com/ https://cdn.slidesharecdn.com/ss_thumbnails/mbbsourcedublin14-140530121856-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/million-browser-botnet-35310566/35310566 Million Browser Botnet https://cdn.slidesharecdn.com/ss_thumbnails/ibanking-abotnetonandroidmay23rd-140530121839-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/i-banking-a-botnet-on-android-may-23rd/35310554 iBanking - a botnet on... https://cdn.slidesharecdn.com/ss_thumbnails/iwantthenextgenerationwebherespdyquic-140530121837-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds SOURCEConference/i-want-the-next-generation-web-here-spdy-quic I want the next genera...