Bulletin Board Code
Copy and paste the following code into your bulletin board post.
DIGITAL COMBAT SIMULATOR
FAR CRY 5
FOOD & DRINK
FORTNITE BATTLE ROYALE
FREEDOM OF SPEECH
GOD OF WAR
HEALTH & WELLNESS
RED DEAD REDEMPTION
WORLD WAR 2
'Squirrels Cause More Infrastructure Damage Cyberwar '
#False cyber attacks
Discussion of several infrastructure issues that were called cyber attacks, but the evidence says they were more likely to be other types of infrastructure attacks.
False cyber attacks
#unconfirmed Cyber Attacks
unconfirmed Cyber Attacks
#Confirmed Cyber attacks
Confirmed Cyber attacks
#Countdown to Zero day
reported to be a Joint US-Israel. Mentions the book "
Countdown to Zero day
" by Kim Zetter as a good reference on
#Ukraine power outage cyber attacks
Ukraine power outage cyber attacks
. There were 2 confirmed
. December 2015 and 2016 People assume Russia is behind them. Black Energy malware with KillDisk was used.
Squirrels Cause More Infrastructure Damage Cyberwar
@CyberSquirrel1 presents an abbreviated version of 35yrs Of Cyberwar, The Squirrels are Winning at Shmoocon 2017. See the map and order stickers at http://www.cybersquirrel1.com
Another Intel Vuln Lets Attackers in Your computer
Certificate Bypass: Hiding and Executing Malware from a Digitally Signed Executable
by Tom Nipravsky Malware developers are constantly looking for new ways to evade the detection and prevention capabilities of security solutions.
PoisonTap USB operation and feature overview
PDF File Format Attacks -- OMG WTF PDF [27C3]
OMG WTF PDF What you didn't know about Acrobat Ambiguities in the PDF specification means that no two PDF parsers will see a file in the same way.
Radar Jamming: "Defensive Electronic Countermeasures" May 1962 US Navy Training Film
Hacking Democracy - the beginning
DEF CON 23 - Mahdi Namazifar - Detecting Randomly Generated Strings
Numerous botnets employ domain generation algorithms (DGA) to dynamically generate a large number of random domain names from which a small subset
USB Killer vs iPhone 7 Plus - Instant Death?
What Happens If You Plug a USB Killer v2.0 Into iPhone 7 Plus? or Note 7? The Fastest Way To Kill a Computer!
The Cyber Skills Gap | Chris Silvers | TEDxElonUniversity
In this talk, Chris Silvers presents thoughts on the technological skills gap from his perspective in the information security industry, in which
Shmoocon 2012: Lessons of the Kobayashi Maru: Cheating is Fundamental
Hands on with the Hak5 Packet Squirrel
Hands on with the Hak5 Packet Squirrel The latest product to hit the Hak5 Shelves is the Packet Squirrel... It's NUTS for networks!
The Latest on Bumping by Deviant Ollam at ShmooCon 4
This was a talk i put together in order to summarize the latest news on the issue of bump keying, which was getting a lot of attention in the
"WEB WARRIORS" Documentry over cyber warfare
Guys this is a documentry by CBC called web warriors over cyberwarfare which i thought i should share ! Watch enjoy and subscribe for more Follow
US Army Tank Gunnery – Live Fire In Poland
Footage of US M1 Abrams tanks conduct tank gunnery training in Poland. The units are from 1st Battalion, 68th Armor Regiment, and 3rd Armored
Shmoocon 2012: Destroying Evidence Before Its Evidence
How to Evict Squirrels by Bill Earl
Bill Earl, a pest control professional in Philadelphia PA talks to a local group about his tools and methods for getting squirrels out of homes.
DEF CON 24 - Picking Bluetooth Low Energy Locks a Quarter Mile Away
Anthony Rose Hacker Ben Ramsey, Hacker Many Bluetooth Low Energy (BLE) enabled deadbolts and padlocks have hit the market recently. These devices
A Nickel Tour of the Ad Fraud Ecosystem – Ryan Castellucci
Sharing Shmoocon 2017 videos on YouTube. Hopefully to help reduce some load on Internet Archive, and because now I can continue to keep a list of
Top Five Emerging Cybersecurity Challenges | Srini Sampalli | TEDxDalhousieU
Srini Sampalli is a Professor and 3M National Teaching Fellow in the Faculty of Computer Science, Dalhousie University, and brings with him more
ShmooCon 2014: The NSA: Capabilities and Countermeasures