

Secret Tools: Learning About Government Surveillance Software You Can’t Ever See There’s no place like 127.0.0.1 – Achieving reliable DNS rebinding in modern browsersĮxploiting 0ld Mag-stripe information with New technology Meet the Feds (who care about security research) YARA-as-a-Service (YaaS): Real-Time Serverless Malware Detectionīreaking Electronic Door Locks Like You’re On CSI: Cyberįree-Fall: Hacking Tesla From Wireless To Can Bus Hadoop Safari : Hunting For Vulnerabilities

Security summer camp is about a week away so I spent some time this afternoon trying to figure out what talks and events I want to make sure I attend.Ī Day in the Life of a Product Security Incident Response Manager
