RSS feed logo header graphic

Black Hat Europe 2008 Media Archives

Black Hat Europe 2008 Topic descriptions are listed alphabetically by speaker.

Feedback forms will be available at the show. Let us know who was hot, who was not and get a chance to win admission to a future Briefings of your choice.

Spam-Evolution

Aseem "@" Jakhar, Technical Lead, IBM Internet Security Systems




video audio presentation ppt

LDAP Injection & Blind LDAP Injection

Chema Alonso, Microsoft

Jose Parada Gimeno, Microsoft




video audio presentation ppt Extras/Tools

Malware on the Net - Behind the Scenes

Iftach Ian Amit, Director of Security Research, Finjan



video audio presentation ppt

Keynote: Digital Security: a Risky Business

Ian O. Angell, Professor of Information Systems. London School of Economics




video audio presentation ppt

CrackStation

Nick Breese, Security Consultant, Security-Assessment.com



video audio presentation ppt

Bad Sushi - Beating Phishers at Their Own Game

Nitesh Dhanjani, Senior Manager and Leader of Application Security Services, Ernst & Young LLP

Billy Rios,Microsoft



video audio presentation ppt

Side Channel Analysis on Embedded Systems. Impact and Countermeasures

Job DeHaas, Senior Specialist, Riscure



video audio presentation ppt

New Viral Threats of PDF Language

Eric Filiol, Head Scientist Officer, Virology and Cryptology Lab, French Signals Academy

video audio presentation ppt Extras/Tools

0-Day Patch -Exposing Vendors (In)Security Performance

Stefan Frei, ETH Zurich, Communications Systems Group

Bernard Tellenbach, ETH Zurich, Communications Systems Group

video audio presentation ppt

Intercepting Mobile Phone/GSM Traffic

David Hulton, Security Researcher, Pico Computing, Inc.

Steve, Security Researcher, Pico Computing, Inc.

video audio presentation ppt

Biologger - A Biometric Keylogger

Matthew Lewis, IRM plc



video audio presentation ppt Extras/Tools

Developments in Cisco IOS Forensics

Felix "FX" Lindner, Recurity Labs GmbH



video audio presentation ppt

URI Use and Abuse

Nathan McFeters, Senior Security Advisor, Ernst & Young

Rob Carter, Security Advisor, Ernst & Young

Billy Rios, Microsoft



video audio presentation ppt

Mobile Phone Spying Tools

Jarno Niemelä, Senior Anti-Virus Researcher, F-Secure



video audio presentation ppt

The Fundamentals of Physical Security

Deviant Ollam, The Open Organization of Lockpickers



video audio presentation ppt Extras/Tools

Client-side Security

Petko D. Petkov, Founder, GNUCITIZEN



video audio presentation ppt Extras/Tools

Antiphishing Security Strategy

Angelo P.E. Rosiello Business Analyst, The European House - Ambrosetti



video audio presentation ppt

Attacking Anti-Virus

Feng Xue (a.k.a Sowhat), Technical Lead, Nevis Labs



video audio presentation ppt

Security Failures in Secure Devices

Christopher Tarnovsky, Flylogic Engineering, LLC.



video audio presentation ppt

Investigating Individuals and Organizations Using Open Source Intelligence

Roelof Temmingh, Founder, Paterva

Chris Böhme, co-founder, Pinkmatter Solutions



video audio presentation ppt

Exposing Vulnerabilities in Media Software

David Thiel, Security Consultant, iSEC Partners



video audio presentation ppt

Hacking Second Life

Michael Thumann, CSO, ERNW GmbH



video audio presentation ppt

Iron Chef Black Hat: John Henry Challenge

Jacob West, Fortify Software

Pravir Chandra, Principal Consultant, Cigital

Brian Chess, Chief Scientist, Fortify Software

Sean Fay, Lead Engineer, Fortify Software




video audio presentation ppt

DTRACE: The Reverse Engineer's Unexpected Swiss Army Knife

David Weston, Science Applications International Corporation (SAIC)

Tiller Beauchamp, Science Applications International Corporation (SAIC)



video audio presentation ppt Extras/Tools
1997-2008 Black Hat ™