Topics
Industry
Events
Podcasts
Research
Recognition
Leadership
Security Weekly
Uncategorized

Metadata and GPS Tracking slides posted

Larry PesceMarch 13, 2009

metacover.tiff The slides for Larry’s Document Metadata and GPS tracking slides have been posted for your reading enjoyment. These were great fun to give and thank you to all that attended.
They can be found on the presentations page, but here’s a few direct links:
Document Metadata, The Silent Killer
Where to now? An Adventure in GPS Tracking
If you have any questions, comments or suggestions, feel free to e-mail me at larry(at)securityweekly.com
– Larry “haxorthematrix” Pesce

Larry Pesce

Larry’s core specialties include hardware and wireless hacking, architectural review, and traditional pentesting. He also regularly gives talks at DEF CON, ShmooCon, DerbyCon, and various BSides. Larry holds the GAWN, GCISP, GCIH, GCFA, and ITIL certifications, and has been a certified instructor with SANS for 5 years, where he trains the industry in advanced wireless and Industrial Control Systems (ICS) hacking. Larry’s independent research for the show has led to interviews with the New York Times with MythBusters’ Adam Savage, hacking internet-connected marital aids on stage at DEFCON, and having his RFID implant cloned on stage at Shmoocon. When not hard at work, Larry enjoys long walks on the beach weighed down by his ham radio, (DE KB1TNF), and thinking of ways to survive the impending zombie apocalypse.

Related

Uncategorized
Attempted spear-phishing attack against NATO state-based petroleum refinery sought to obtain intelligence

SC StaffDecember 21, 2022

CyberScoop reports that Russia-linked advanced persistent threat group Trident Ursa, also known as Gamaredon or Armageddon, has deployed a spear-phishing attack against a major petroleum refining firm in a NATO member state.

Uncategorized
Funding round brings in $33M for Balance Theory

SC StaffDecember 7, 2022

SiliconAngle reports that Balance Theory, which offers a cybersecurity collaboration platform, has landed $3 million in a seed funding round.

Uncategorized
FreeBSD addresses critical ping vulnerability

SC StaffDecember 7, 2022

Updates have been issued by FreeBSD operating system maintainers to fix a critical security flaw in the ping module, which threat actors could leverage to enable remote code execution or program crashes, reports The Hacker News. All supported FreeBSD versions are impacted by the stack-based buffer overflow bug, tracked as CVE-2022-23093. "ping reads raw IP packets from the network to process responses in the pr_pack() function... The pr_pack() copies received IP and ICMP headers into stack buffers for further processing.

Related Events

  • Live Conference
    2023 CyberRisk Leadership Exchange: Atlanta

    Wed Jun 21Wed Jun 21

  • Live Conference
    2023 CyberRisk Leadership Exchange: Dallas

    Thu May 18Thu May 18

  • Live Conference
    2023 CyberRisk Leadership Exchange: Cincinnati

    Wed Jun 7Wed Jun 7

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.

prestitial ad

About Us
SC MediaCyberRisk AllianceContact UsCareersPrivacy
Get Involved
SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us
Explore
Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2022 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.