The third edition of BSidesLondon has been announced! Â The crew has already started to work on the event organization and the CFP is open. Block already your agenda:Â April 24th, 2013 – Kensington & Chelsea Town Hall. I attended the two first editions as a speaker in 2011 and regular visitor
Category: People / Places
Digital or Analog Life, Same Issues!
We are living in a digital era and I like this! From a security point of view because it generates a lot of issues that we have to deal with (being infosec pro, it’s our daily job). But also because I like “gadgets”. We are big kids 😉 On the
CPE vs. CHI
Strange title isn’t it? Be patient, you’ll understand. Today, I’d like to post a small reflection about a discussion I had with other infosec guys during BruCON. This is not directly related to information security… though! The discussion was about the difficulties to combine a job and family life! Let’s
Visitors of Music Festivals Sharing Their SSIDs!
In January, I developed a tool to sniff Wi-Fi SSIDs. I decided to call it ‘hoover‘ (based on the vacuum cleaner brand). The original post is here. I’m often running this tool in my area to detect the presence of some people in the neighborhood or when I’m staying at hotels.
London… a Nest of Infosec People
I’m back from a small trip to London where is happening some kind of a “security marathon” this week! In parallel to InfoSecurity Europe 2012, several “alternative” events where organized in the same area. However I did not visited InfoSecurity. I was present at the Benelux edition a few weeks
Ranking People Like Domains or IP Addresses?
Real time events or network traffic analysis is interesting to track suspicious behaviors. And, if you add some external sources of information, you could increase even more the capability of detecting real events. Such ranking sources applies usually to IP addresses and domain names. They are plenty of online resources
Show Me Your DNS Logs, I’ll Learn about You!
During the last BruCON edition (0x03), we operated our own DNS resolver. Instead of using public servers or the ones proposed by our ISP, pushing our own DNS resolver to network visitors can be really interesting. Of course, addicted to logs, I activated the “queries_log” feature of bind to log
Will Security Researchers Need a License to kill?
The European Commission is capable of the worst as best ideas! A few days ago, they announced the imminent setup of a CERT (“Computer Emergency Response Team”) to protect the institutions, agencies and bodies against cyber-attacks. Good idea! But, a few days ago, a press-release announced that Justice Ministers, who
After Steganography, “Steganodrug”?
Steganography is a technique used to hide a message in another one. This word has a Greek origin: “steganos” means “covered or protected“. A well-known application of steganography is hiding a picture into another one. In information security, it can be useful as an evasion technique. But people have a
Security B-Sides … Because Quality is not Always Expensive
Infosec people must keep their knowledge at the highest level. New threads, new technologies arise all the time. If you don’t perform a continuous education, you’ll are dead, so simply! There are plenty of ways to keep learning: books, forums, podcasts. Those are based on self-learning. Trainings and security conferences