ExCeL London
One Western Gateway, Royal Victoria Dock, London, United Kingdom
Tony Gee will be at the IASME Pavilion, presenting twice each day: Patch my stuff? No thanks. I’d rather pay the ransom. This presentation will discuss the threats facing the legal world, including ransomware and the many data leaks from law firms. A lot of these are brushed under the carpet, although there are cases […]
ILEC Conference Centre
47 Lillie Road, London, United Kingdom
Vangelis Stykas is presenting: Charge my car, for free, forever! Current trends show that electric cars and green energy, especially photo-voltaic energy, are being widely adopted in both commercial and home user markets. During this talk, we will see that they suffer from typical "rush to market" problems that can potentially allow a remote attacker […]
The ISACA dinner 25 November will start with a live IoT hacking session with Jo Dalton, Associate Partner, Pen Test Partners. https://www.linkedin.com/posts/isaca-sweden-chapter_breaking-news-the-isaca-dinner-25-november-activity-6866362477664370688-UKEB/
Tramshed Cardiff
Clare Rd, Cardiff, Glamorgan, United Kingdom
Pwning 10^7 devices in 10^1 minutes across 10^2 endpoints Vangelis will cover in 10 one-minute slides how anyone could control 10^7 (that’s 10 million) devices by exploiting a series of simple yet critical API flaws that were typical “rush to market” flaws that can allow an attacker to control and even use them as […]
Vangelis Stykas will be presenting: Current trends show that electric cars and green energy, especially photo-voltaic energy, are being widely adopted in both commercial and home user markets. During this talk, we will see that they suffer from typical “rush to market” problems that can potentially allow a remote attacker to control them. This could […]
Spielboden Dornbirn
Färbergasse 15, Dornbirn, Austria
Ken Munro will be presenting: We need to talk about sex toys and cyber security Tickets: https://www.universe.com/events/tedxdornbirn-26022022-tickets-GXC1W6
In this session we will look at how modern hackers gain access to your customers data, we will explore the how ransomware operators work, how they obtain access, be that from staff selling VPN credentials to your staff’s terrible passwords. We will show how your room occupancy monitors and meeting room products could lead to […]