BlueHat Security Briefings

Do you believe in ghosts?

When I was a kid, I had nightmares every week. I still remember some of them vividly, particularly the ones where ghosts were involved. Not the typical ghosts from the movies, but ones that could not be seen, only heard and felt. Why would I be so frightened and still remember them “vividly” today? Because …

Do you believe in ghosts? Read More »

BlueHat Security Forum: Buenos Aires Edition

Handle:C-Lizzle IRL: Celene Temkin Rank: Program Manager 2 & BlueHat Project Manager Likes: Culinary warfare, BlueHat hackers and responsible disclosure Dislikes: Acts of hubris, MySpace, orange mocha Frappaccinos! Hey Everyone! What speaks English, Portuguese and Spanish, has a hundred set of eyes, and battles in the defense of good against evil on a daily basis? …

BlueHat Security Forum: Buenos Aires Edition Read More »

BlueHat v9 brings the looking glass to you

Celene here from the MSRC Ecosystem Strategy Team. BlueHat v9: Through The Looking Glass ended just over a month ago and the success of the con lives on due to the outstanding training and networking between Microsoft employees, external speakers, and guests. I’m happy to say that the speaker video interviews and selected recorded presentations …

BlueHat v9 brings the looking glass to you Read More »

BlueHat v9 Brings the Looking Glass To You…

Handle:C-Lizzle IRL: Celene Temkin Rank: Program Manager 2 & BlueHat Project Manager Likes: Culinary warfare, BlueHat hackers and responsible disclosure Dislikes: Acts of hubris, MySpace, orange mocha Frappaccinos! Celene here from the MSRC Ecosystem Strategy Team. BlueHat v9: Through The Looking Glass ended just over a month ago and the success of the con lives …

BlueHat v9 Brings the Looking Glass To You… Read More »

Know thy Enemy

I recently attended BlueHat for the second time and spoke about the SMS vulnerabilities Collin Mulliner and I discovered and exploited this summer. BlueHat is an interesting speaking venue because the audience consists entirely of Microsoft employees. Some people might think security researchers speaking at Microsoft is like speaking before the enemy, but that is …

Know thy Enemy Read More »

The lighter side of the cloud

Billy Rios here. I’m giving a talk this week along with Nate McFeters entitled, “Sharing the Cloud with Your Enemy.” It’s a fun, realistic talk on security in the cloud. Why cloud computing? Cloud computing, software as a service, infrastructure as a service, platform as a service… with so many different terms and so much …

The lighter side of the cloud Read More »

Attacking SMS

This year at BlackHat USA in Las Vegas, we presented on the topic of attacking Short Message Service (SMS). Our presentation focused on the different ways in which SMS can be used to compromise mobile security. We’re excited to give an updated version of our talk at the upcoming BlueHat v9 conference later this month, …

Attacking SMS Read More »

Babel Hacking

Hello world!  Remember Mad Libs?  How about Scrabble, when you’d try making up words that sound legit just to be de-bluffed by your friend.  Playing these games provides endless hours of fun with words and letters.  In software and the Internet, words, letters, and text are everything.  Whether you’re up in the cloud, down in …

Babel Hacking Read More »

Collaborating on RIA Security

Microsoft and Adobe frequently work together on security. At this year’s BlueHat, we will come together to share our security research in the area of Rich Internet Applications (RIAs). While we independently place considerable thought and effort into our respective security models, attackers often look for methods in which to combine technologies for an attack. …

Collaborating on RIA Security Read More »

Can we secure cloud computing? Can we afford not to?

There have been many disruptive innovations in the history of modern computing, each of them in some way impacting how we create, interact with, deliver, and consume information. The platforms and mechanisms used to process, transport, and store our information likewise endure change, some in subtle ways and others profoundly. Cloud computing is one such …

Can we secure cloud computing? Can we afford not to? Read More »