Latest News
ACMA secures pledges from major online retailers to block "dodgy" mobile sales
Vic energy department seeks CIO
Defence gives $84m IT support contract to Unisys
NBN Co puts a longer predictive lens on its digital twin ambitions
Cochlear pilots voice-to-text Salesforce integration for lead management
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
BENCHMARK AWARDS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
BENCHMARK AWARDS
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Galleries
Technology
Security
Breakpoint 2013 (updated) #bpx
Continually updated photos snapped at Ruxcon Breakpoint.
on Oct 24 2013 6:53PM
Aaron Portnoy gives insight into an approach to the vulnerability discovery and exploitation process.
Jonathan Brossard says malware sandboxing is dangerous in the enterprise context.
SeungJin Lee recommends you move your smart TV from your bed or maybe he'll hack it and spy on you.
And calls out some BS in the vendor space
Brossard
Stefan Esser on iOS exploitation.
DAY TWO: Tom Symers and Grayson Zulauf talk car CAN hacking. Don't let them borrow you car.
Fuzzing.
Grayson Zulauf.
The crowd gives insights into the hobbyist and commercial car CAN hacking scene.
The delegates for Rascagneres' talk.
Danny Quist loves reversing so much he named his kids Ida and Olly.
The delegates listen to Quist.
Paul Rascagneres revisits his Chinese hacker ownage that landed him a pwnie.
Bonus: Rascagneres finds some local Aust govt creds on a APT1 server.
John Butterworth on Bios chronomancy.
Butterworth talks to the crowd.
Aaron Portnoy gives insight into an approach to the vulnerability discovery and exploitation process.
Copyright © SC Magazine, Australia
Linked Articles
Aussie govt passwords stolen by Chinese hacker group
#BPX audio: Michael Sulmeyer: The Political Economy of the Cyber-security and Malware Markets
Smart TVs a spying portal for hackers, researcher finds
Tags:
breakpoint 2013
Related Articles
Services Australia may get powers to rein in data breach exposure
Apple, Google send new round of cyber threat notifications to users
India revokes order to preload cyber security app on smartphones
Please enable JavaScript to view the
comments powered by Disqus.
Most popular tech stories
Audit Office of NSW and Data61 explore AI for gov auditing
Accenture to train 30,000 staff on Anthropic's Claude
Cochlear pilots voice-to-text Salesforce integration for lead management
Virgin Australia, Wesfarmers strike OpenAI agreements
CBA finds its first chief AI officer
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
'Touch-free' smartphone controlled with head movements
Photos: Australian industry explores data for net zero
Axis Communications opens experience centre in Sydney tech hub
Photos: The 2024 IoT Awards winners
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?