February 12th, 2012 | ๐
Powered by iSpeech Speaker: Eric Fulton Director of Research, Lake Missoula Group, LLC People inherently trust their phones, but should
December 26th, 2011 | ๐
https://www.ispeech.org/text.to.speech In this video you can see Cuckoo Sandbox analyzing a ZeuS v2 malware sample. You can also taste some
November 28th, 2011 | ๐
Text to SpeechAbstract Filtering or sanitization is the predominant mechanismin todayโs applications to defend against cross-site scripting (XSS) attacks. XSS
November 21st, 2011 | ๐
https://www.ispeech.org Less than four months ago, the Southern portion of Sudan seceded and formed South Sudan, only the 5th country
November 4th, 2011 | ๐
iSpeechNSS engineers have developed a scanning tool that can be used to detect all DuQu drivers installed on a system.
September 20th, 2011 | ๐
https://www.ispeech.org/text.to.speechAbstract While most research on XSS defense has focused on techniques for securing existing applications and re-architecting browser mechanisms, sanitization
June 30th, 2011 | ๐
Text to Speech Aaron Kaplan & Christian Wojner of CERT.at: โThis talk will show people how to use Minibis -
May 27th, 2011 | ๐
Powered by iSpeech The "corporate" version of my EIP talk, given at a NYC InfraGard meeting (primarily physical security audience).
May 18th, 2011 | ๐
iSpeech.org Text tutorial: http://technology-flow.com/articles/windows-malware-analysis/ Learn to analyze a suspicious file. You will learn how to find what processes it spawns,
May 16th, 2011 | ๐
iSpeech.org This video shows a demo of Cuckoo 0.2 beta while analyzing several components from the Koobface worm. Enjoy! source
April 7th, 2011 | ๐
https://www.ispeech.org Snort Intrusion Detection Forensics demo by Keatron Evans from InfoSec Institute. Resources.InfoSecInstitute.com for Computer Forensics Videos http://resources.infosecinstitute.com Computer Forensics
April 3rd, 2011 | ๐
iSpeech In this video I use the File Analysis tools within Autopsy to examine an image file. This video is
December 20th, 2010 | ๐
TTS This analysis comes in handy in computer forensics cases such as porn or child pornography investigations. This video shows
February 15th, 2010 | ๐
iSpeech.org Learn malware analysis fundamentals from the primary author of SANS' course FOR610: Reverse-Engineering Malware (REM). More at http://LearnREM.com. In
Gloss