Bulletin Board Code
Copy and paste the following code into your bulletin board post.
DIGITAL COMBAT SIMULATOR
FAR CRY 5
FOOD & DRINK
FORTNITE BATTLE ROYALE
FREEDOM OF SPEECH
GOD OF WAR
HEALTH & WELLNESS
RED DEAD REDEMPTION
WORLD WAR 2
'Squirrels Cause More Infrastructure Damage Cyberwar '
#False cyber attacks
Discussion of several infrastructure issues that were called cyber attacks, but the evidence says they were more likely to be other types of infrastructure attacks.
False cyber attacks
#unconfirmed Cyber Attacks
unconfirmed Cyber Attacks
#Confirmed Cyber attacks
Confirmed Cyber attacks
#Countdown to Zero day
reported to be a Joint US-Israel. Mentions the book "
Countdown to Zero day
" by Kim Zetter as a good reference on
#Ukraine power outage cyber attacks
Ukraine power outage cyber attacks
. There were 2 confirmed
. December 2015 and 2016 People assume Russia is behind them. Black Energy malware with KillDisk was used.
Squirrels Cause More Infrastructure Damage Cyberwar
@CyberSquirrel1 presents an abbreviated version of 35yrs Of Cyberwar, The Squirrels are Winning at Shmoocon 2017. See the map and order stickers at http://www.cybersquirrel1.com
Another Intel Vuln Lets Attackers in Your computer
Certificate Bypass: Hiding and Executing Malware from a Digitally Signed Executable
by Tom Nipravsky Malware developers are constantly looking for new ways to evade the detection and prevention capabilities of security solutions.
PoisonTap USB operation and feature overview
PDF File Format Attacks -- OMG WTF PDF [27C3]
OMG WTF PDF What you didn't know about Acrobat Ambiguities in the PDF specification means that no two PDF parsers will see a file in the same way.
Radar Jamming: "Defensive Electronic Countermeasures" May 1962 US Navy Training Film
Hacking Democracy - the beginning
DEF CON 23 - Mahdi Namazifar - Detecting Randomly Generated Strings
Numerous botnets employ domain generation algorithms (DGA) to dynamically generate a large number of random domain names from which a small subset
USB Killer vs iPhone 7 Plus - Instant Death?
What Happens If You Plug a USB Killer v2.0 Into iPhone 7 Plus? or Note 7? The Fastest Way To Kill a Computer!
The Secret Cyberwar is Here: Director Alex Gibney on 'Zero Days' Documentary, Stuxnet & Cyberweapons
"The potential for enormous destruction and loss of life is palpable when it comes to cyberweapons," says Alex Gibney, director of the new film Zero
Cyberwar | Amy Zegart | TEDxStanford
What makes today’s issues of cyber security different than any other threat we’ve faced as a nation? Co-director of Stanford’s Center for
Shmoocon 2012: Lessons of the Kobayashi Maru: Cheating is Fundamental
ShmooCon 2014: The NSA: Capabilities and Countermeasures
DEF CON 24 - Picking Bluetooth Low Energy Locks a Quarter Mile Away
Anthony Rose Hacker Ben Ramsey, Hacker Many Bluetooth Low Energy (BLE) enabled deadbolts and padlocks have hit the market recently. These devices
Governments don't understand cyber warfare. We need hackers | Rodrigo Bijou
The Internet has transformed the front lines of war, and it's leaving governments behind. As security analyst Rodrigo Bijou shows, modern conflict
DEFCON 20: The Art of Cyberwar
Speaker: KENNETH GEERS NCIS CYBER SUBJECT MATTER EXPERT The establishment of US Cyber Command in 2010 confirmed that cyberspace is a new domain of
Shmoocon 2012: Credit Card Fraud: The Contactless Generation
Forensic Imager Tools: You don't have the Evidence - Shmoocon 2014
Recorded at Shmoocon 2014 - Forensic Imager Tools: You don't have the Evidence - talks about the weaknesses in the Forensic Imagers compared to real
We need to start attacking Disc Detainer locks. Shmoocon Firetalks 2011
A short (sub-15 minute) discussion of Disc Detainer locks & potential weaknesses from the Shmoocon 2011 Firetalks.
'Dark Territory: The Secret History of Cyber War'
Fred Kaplan discusses 'Dark Territory,' his book on the untold story of the officers, policymakers, scientists, and spies who devised a new form of
ShmooCon 2017: So You Want to Hack Radios (Marc Newlin and Matt Knight)
Marc Newlin and Matt Knight of Bastille's Threat Research team walk through how to apply RF reverse engineering fundamentals to proprietary wireless