Innhold levert av Black Hat Announcements. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av Black Hat Announcements eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.
Player FM - Podcast-app Gå frakoblet med Player FM -appen!
Bob Stobener , a seasoned leader celebrated for his adept communication skills, has a unique perspective on improving communication as a means to foster understanding and collaboration. Drawing from his creative background in cartooning and strategic advertising at a successful comedy club, Stobener believes that effective communication is essential not only for resolving conflicts but also for enhancing personal and professional growth. He emphasizes the importance of listening and forming genuine connections, demonstrating how these practices can lead to positive outcomes, as seen in his ability to guide team members toward fulfilling career paths. By advocating for open and honest dialogue, Stobener illustrates how strong communication skills can support individual success and organizational excellence across various industries. (00:01:52) Communication Skills: Comedy Club to Corporate Success (00:14:21) Transparent Interactions: The Foundation of Leadership Success (00:14:21) Transformative Impact of Transparent Leadership Communication (00:19:41) Mastering Communication Skills for Multifaceted Success Hosted by Larry Wilson Produced by: Verbal Ninja Productions Producer: R. Scott Edwards Sponsored by: The Wilson Method **Check out NEW upgraded website with FREE offer !! Visit: https://theWilsonMethod.com Link: TheWilsonMethod.com…
Innhold levert av Black Hat Announcements. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av Black Hat Announcements eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.
Black Hat Digital Self Defense. Black Hat provides cutting edge content in the information and computer security field. Keep up to date with Black Hat presentations, announcements, and free content.
Innhold levert av Black Hat Announcements. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av Black Hat Announcements eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.
Black Hat Digital Self Defense. Black Hat provides cutting edge content in the information and computer security field. Keep up to date with Black Hat presentations, announcements, and free content.
Nathan McFeters, Jon Heasman and Rob Carter gave a very popular and heavily covered presentation this year that introduced the world to the term "gifar." It's fascinating information, and well presented. We hope that those of you who couldn't make it to the Vegas event will get a taste of the kind of presentations attendees get to see and attendees who weren't able to make it to the Beyond Document.Cookie will get their chance to see the presentation in full. Standard Video Full Video mp3 Audio…
You can now listen David Litchfield's webcast presentation about his new Oracle database forensics tool orablock online here: Bookmarkable audio version: https://media.blackhat.com/webinars/black-hat-6-december-2008-litchfield.m4b Web Sync Version http://w.on24.com/r.htm?e=122240&s=1&k=57F93C9128D5D1BBC64B8AE7177FB981…
Bookmarkable audio for all talks is now available in the Japan 08 archive. Lots of good stuff there - please enjoy. The archive link is https://www.blackhat.com/html/bh-japan-08/brief-bh-jp-08-archives.html The Keynote is enclosed with this entry, but there are lots of great presentations to check out.…
in case you missed Black Hat Webcast #5 : Clickjacking and Browser Security with Jeremiah Grossman, the archived version is now online in two formats. You can listen to the audio here: https://media.blackhat.com/webinars/black-hat-webcast-5-november-08-clickjacking.m4b Or follow the slides in the live websync by following this link: http://w.on24.com/r.htm?e=122494&s=1&k=05ED21C1734D531D2D84CA56F4ADB0F2…
The Business:Timeline - how did we get into this mess? The Technology: Technical overview of different types of programs (taxonomy). Looking ahead: Market polarization, bad get worse, good get better (more white, less grey). Exploiting Adware.
Many of the various attacking mechanism such as spam email, DDoS that are attacking the internet as whole in recent years can be attributed to Botnets. However there is not much information on these Botnets yet. Telecom ISAC-Japan and JPCERT/CC conducted a detailed investigation regarding botnet activity. This session will cover what was found during the investigation and the current state of the massive amount of infected users and sub-species of botnets.…
In September 2004, much hype was made of a buffer overflow vulnerability that existed in the Microsoft engine responsible for processing JPEG files. While the resulting vulnerability itself was nothing new, the fact that a vulnerability could be caused by a non-executable file commonly traversing public and private networks was reason for concern. File format vulnerabilities are emerging as more and more frequent attack vector. These attacks take advantage of the fact that an exploit can be carried within non-executable files that were previously considered to be innocuous. As a result, firewalls and border routers rarely prevent the files from entering a network when included as email attachments or downloaded from the Internet.…
Has your network ever been hacked, and all you have to show for your investigative efforts is an IP address belonging to an ISP in Irkutsk? Are you tired of receiving e-mails from Citibank that resolve to Muscovite IP addresses? Would you like to hack the Kremlin? Or do you think that the Kremlin has probably owned you first? Maybe you just think that Anna Kournikova is hot. If the answer to any of the above questions is yes, then you need an introduction to the Gulag Archipelago of the Internet, the Cyberia of interconnected networks, Russia. . .…
The use of phishing/cross-site scripting (XSS) hybrid attacks for financial gain is spreading. It's imperative that security professionals familiarize themselves with these new threats to protect their websites and confidential corporate information. This isn't just another presentation about phishing scams or cross-site scripting. We're all very familiar with each of those issues. Instead, we'll discuss the potential impact when the two are combined to form new attack techniques. Phishers are beginning to exploit these techniques, creating new phishing attacks that are virtually impervious to conventional security measures. Secure sockets layer (SSL), blacklists, token-based authentication, browser same-origin policy, and monitoring / take-down services offer little protection. Even eyeballing the authenticity of a URL is unlikely to help.…
Last year at Black Hat, we introduced the rootkit FU. FU took an unprecented approach to hiding not previously seen before in a Windows rootkit. Rather than patching code or modifying function pointers in well known operating system structures like the system call table, FU demonstrated that is was possible to control the execution path indirectly by modifying private kernel objects in memory. This technique was coined DKOM, or Direct Kernel Object Manipulation. The difficulty in detecting this form of attack caused concern for anti-malware developers. This year, FU teams up with Shadow Walker to raise the bar for rootkit detectors once again. In this talk we will explore the idea of memory subversion. We demonstrate that is not only possible to hide a rootkit driver in memory, but that it is possible to do so with a minimal performance impact. The application (threat) of this attack extends beyond rootkits. As bug hunters turn toward kernel level exploits, we can extrapolate its application to worms and other forms of malware. Memory scanners beware the axiom, "vidre est credere." Let us just say that it does not hold the same way that it used to.…
In forensic research it is imperative to search for Japanese language strings. However many of the tools used in forensic research are being developed outside of Japan, and therefore not tuned for the Japanese language. In Japan there is research being done on using character encoding for anti-forensic countermeasures, and therefore character encoding and Japanese are significant issues for Japanese agents. This session will cover the various issues on Japanese when using popular forensic tools and other technical issues for future considerations.…
This presentation will cover SIP and VoIP related automated fuzzing techniques. Using real world vulnerabilities and audit engagements we will give a technical understanding of this emerging technology and its common attack vectors. The techniques discussed in this talk will not only be limited to SIP but will apply to methodical audit approaches for fuzzing text based protocols which can be more complex then fuzzing binary protocols.…
Interpreted, dynamically-typed, and object-oriented languages like Ruby and Python are very good for many programming task in my opinion. Such languages have many benefits from rapid, easy development to increased security against memory allocation and manipulation related vulnerabilities. However, choice of programming language alone does not guarantee the resulting software written in the language will be free of security vulnerabilities, which is an obvious point, but the sources of the potential vulnerabilities may not be obvious at all.…
Look at your new device! It has a great case, plenty of buttons, and those blue LEDs - wow! But when you strip away the trappings of modern artistic design, what does it really do and how does it help you sleep at night? Perhaps most importantly, what do hackers know about this new toy that you do not? Would you be surprised to know that simple TCP fragmentation can evade most security products in the world? What would you think if you learned that a hacker can apply simple, normally accepted encoding schemes to launch attacks right through most security tools? Come and see what hackers know; if you rely on these products to keep you safe, you can't afford not to.…
This presentation details the methods attackers utilize to gain access to wireless networks and their attached resources. Examples of the traffic that typifies each attack are shown and discussed, providing attendees with the knowledge too identify each attack. Defensive measures that can be taken in real time to counter the attack are then presented.…
Our networks are growing. Is our understanding of them? This talk will focus on the monitoring and defense of very large scale networks, describing mechanisms for actively probing them and systems that may evade our most detailed probes. We will analyze these techniques in the context of how IPv6 affects, or fails to affect them. A number of technologies will be discussed.…
Velkommen til Player FM!
Player FM scanner netter for høykvalitets podcaster som du kan nyte nå. Det er den beste podcastappen og fungerer på Android, iPhone og internett. Registrer deg for å synkronisere abonnement på flere enheter.
Bli med på verdens beste podcastapp for å håndtere dine favorittserier online og spill dem av offline på vår Android og iOS-apper. Det er gratis og enkelt!