These were the speakers at Security Fest 2017.Thanks for helping us make this conference awesome!
Early in the 21st Century, connected sensor evolution advanced into the economic bubble phase – a term assigned to almost every kind of device imaginable – known as the Internet of Things. Industry unicorns lead the way. Commerce is their goal. More...
This software visits all domains on the Swedish web and examines the HTML/JS code for malware like redirect gateways and URL patterns related to exploit kits. The talk will cover how to retrieve and shorten the URL list, how the main program works,...
A few years ago, Frans and his team posted an article on Detectify Labs regarding domain hijacking using services like AWS, Heroku and GitHub. These issues still remains and are still affecting a lot of companies. Jonathan Claudius from Mozilla even...
It’s no secret that embedded systems surround and control our daily lives. Embedded device and system manufactures have long prioritized code quality and/or user experience over application security. As devices become more interconnected to each other,...
Malware authors try to hide from malware analysts or security researchers with plenty of techniques. They can seriously make it hard to analyze their code or simply run the malware on automated tools for mass scale analysis. People are developing more...
Internet of Things is a toolbox, and as any tool it can be used for good and for bad. Applying a hacker mindset and using my own home and body, I’ve explored the prerequisites for doing IoT in an ethical and secure – and fun – way. Issues range from...
Panel debate allowing open talks, with a focus on embedded security.
Self-XSS is a type of XSS defined by the fact that it only affects the currently authenticated user. Harmless at first sight, but with the right premises Self-XSS is just as dangerous as good old regular XSS.
There is a Swedish proverb, “All methods are good except for the bad ones” which applies very well to reverse engineering. Sometimes targets elude the usual methodologies of reverse engineering and the need for alternative ways to the goal arises. This...
Often defenders worry about the intangible security problems. Defenders need to concentrate their efforts defending the enterprise by focusing on the fundamentals. Too often issues such as patching or system configuration failures lead to system...
See all speakers at Security Fest