Category Archives: InfoSec

[Recommended Video] Defcon 18 Pwned By the owner What happens when you steal a hackers computer zoz part

Source: YouTube

Image source.

Advertisements

Leave a comment

Filed under Conference, General, InfoSec, Recommendations, Talks

OWASP Bucharest AppSec Conference 2017

Source: OWASP Bucharest AppSec Conference 2017

OWASP Bucharest team is happy to announce the OWASP Bucharest AppSec Conference 2017 a three days Security and Hacking Conference with additional training days dedicated to the application security. It will take place 11th through 13th of October, 2017 – Bucharest, Romania. With 11th and 12th  being training only days, 13th of October is the day of the conference!
The stated objective of the OWASP’s Bucharest AppSec Conference is to “raise awareness about application security and to bring high-quality security content provided by renowned professionals in the European region.”

Registration is free and all materials are available under a free and open software license.

Who Should Attend?

  • Application Developers
  • Application Testers and Quality Assurance
  • Application Project Management and Staff
  • Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
  • Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
  • Security Managers and Staff
  • Executives, Managers, and Staff Responsible for IT Security Governance
  • IT Professionals interested in improving IT Security
  • Anyone interested in learning about or promoting Web Application Security

Further information about the talks is available here. Registration is FREE so you just need to book your seat using this link, print your ticket and present it at the entrance.

Check out the training opportunities here and be advised as the number of available seats is limited!

Spoilers: Adobe Romania’s , Cristian OPINCARU will be delivering an awesome talk on “Protecting against credential stuffing attacks” and Cristina NICA, Andreea CUTLACAI & Daniela ENE organized a very interesting panel discussion on Women in AppSec!

 

Leave a comment

Filed under Conference, Events, General, InfoSec, Recommendations, Training

[Recommended Video] Women in Security panel @ OWASP AppSec 2016

Source: OWASP YouTube Channel

Image source.

Leave a comment

Filed under Conference, General, InfoSec, Recommendations, Talks

[Recommended Reading] Artificial Intelligence

Source: Artificial Intelligence Wikipedia

“Artificial intelligence (AI, also machine intelligenceMI) is intelligence exhibited by machines, rather than humans or other animals (natural intelligence, NI). In computer science, the field of AI research defines itself as the study of “intelligent agents”: any device that perceives its environment and takes actions that maximize its chance of success at some goal.[1] Colloquially, the term “artificial intelligence” is applied when a machine mimics “cognitive” functions that humans associate with other human minds, such as “learning” and “problem solving”.[2]Read more…

Image source.

Leave a comment

Filed under Articles, General, InfoSec, Recommendations, Uncategorized

[Recommended Reading] Quantum computing

Source: Quantum Computing Wikipedia

“Quantum computing studies theoretical computation systems (quantum computers) that make direct use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data.[1] Quantum computers are different from binary digital electronic computers based on transistors. Whereas common digital computing requires that the data be encoded into binary digits (bits), each of which is always in one of two definite states (0 or 1), quantum computation uses quantum bits, which can be in superpositions of states. A quantum Turing machine is a theoretical model of such a computer, and is also known as the universal quantum computer. The field of quantum computing was initiated by the work of Paul Benioff[2] and Yuri Manin in 1980,[3] Richard Feynman in 1982,[4] and David Deutsch in 1985.[5] A quantum computer with spins as quantum bits was also formulated for use as a quantum spacetime in 1968. Read more…

Image source

Leave a comment

Filed under General, InfoSec, Recommendations