Bulletin Board Code
Copy and paste the following code into your bulletin board post.
DIGITAL COMBAT SIMULATOR
FAR CRY 5
FOOD & DRINK
FORTNITE BATTLE ROYALE
FREEDOM OF SPEECH
GOD OF WAR
HEALTH & WELLNESS
RED DEAD REDEMPTION
WORLD WAR 2
'Squirrels Cause More Infrastructure Damage Cyberwar '
#False cyber attacks
Discussion of several infrastructure issues that were called cyber attacks, but the evidence says they were more likely to be other types of infrastructure attacks.
False cyber attacks
#unconfirmed Cyber Attacks
unconfirmed Cyber Attacks
#Confirmed Cyber attacks
Confirmed Cyber attacks
#Countdown to Zero day
reported to be a Joint US-Israel. Mentions the book "
Countdown to Zero day
" by Kim Zetter as a good reference on
#Ukraine power outage cyber attacks
Ukraine power outage cyber attacks
. There were 2 confirmed
. December 2015 and 2016 People assume Russia is behind them. Black Energy malware with KillDisk was used.
Squirrels Cause More Infrastructure Damage Cyberwar
@CyberSquirrel1 presents an abbreviated version of 35yrs Of Cyberwar, The Squirrels are Winning at Shmoocon 2017. See the map and order stickers at http://www.cybersquirrel1.com
Another Intel Vuln Lets Attackers in Your computer
Certificate Bypass: Hiding and Executing Malware from a Digitally Signed Executable
by Tom Nipravsky Malware developers are constantly looking for new ways to evade the detection and prevention capabilities of security solutions.
PoisonTap USB operation and feature overview
PDF File Format Attacks -- OMG WTF PDF [27C3]
OMG WTF PDF What you didn't know about Acrobat Ambiguities in the PDF specification means that no two PDF parsers will see a file in the same way.
Radar Jamming: "Defensive Electronic Countermeasures" May 1962 US Navy Training Film
Hacking Democracy - the beginning
DEF CON 23 - Mahdi Namazifar - Detecting Randomly Generated Strings
Numerous botnets employ domain generation algorithms (DGA) to dynamically generate a large number of random domain names from which a small subset
USB Killer vs iPhone 7 Plus - Instant Death?
What Happens If You Plug a USB Killer v2.0 Into iPhone 7 Plus? or Note 7? The Fastest Way To Kill a Computer!
Cyberwar | Amy Zegart | TEDxStanford
What makes today’s issues of cyber security different than any other threat we’ve faced as a nation? Co-director of Stanford’s Center for
DEF CON 24 - Picking Bluetooth Low Energy Locks a Quarter Mile Away
Anthony Rose Hacker Ben Ramsey, Hacker Many Bluetooth Low Energy (BLE) enabled deadbolts and padlocks have hit the market recently. These devices
ShmooCon 2014: The NSA: Capabilities and Countermeasures
DEF CON 24 SE Village - Jayson Street - Total Fail: and Bad Mistakes, I've Made a Few
In an industry that does so much to uncover and expose the mistakes of others. Which don’t get me wrong is a valuable service in helping to increase
Shmoocon 2012: Lessons of the Kobayashi Maru: Cheating is Fundamental
Squirrels A Mission Impossible !
Many years ago my father tried and failed to feed birds but not squirrels. His attempts were pretty clever (he was a designer) but he always fell
This Is How Easy It Is To Get Hacked | VICE on HBO
Since the 2016 election, the notion of hacking has become inextricably intertwined with one country: Russia. But cyber crimes emanating from Russia
DEF CON 24 - Anch - So you think you want to be a penetration tester
So, you think you want to be a penetration tester, or you already are and don’t understand what the difference between you and all the other “so
Our lonely society makes it hard to come home from war | Sebastian Junger
Sebastian Junger has seen war up close, and he knows the impact that battlefield trauma has on soldiers. But he suggests there's another major cause
Hands on with the Hak5 Packet Squirrel
Hands on with the Hak5 Packet Squirrel The latest product to hit the Hak5 Shelves is the Packet Squirrel... It's NUTS for networks!
DEF CON 18 - Jason Scott - You're Stealing It Wrong! 30 Years of Inter-Pirate Battles
Jason Scott - You're Stealing It Wrong! 30 Years of Inter-Pirate Battles Historian Jason Scott walks through the many-years story of software piracy
Encryption: Last Week Tonight with John Oliver (HBO)
Strong encryption poses problems for law enforcement, is weakening it worth the risks it presents? It’s…complicated. Connect with Last Week