The third edition of BSidesLondon has been announced! Â The crew has already started to work on the event organization and the CFP is open. Block already your agenda:Â April 24th, 2013 – Kensington & Chelsea Town Hall. I attended the two first editions as a speaker in 2011 and regular visitor
Category: Security
RSA Conference Europe Wrap-Up Day #3
The third day is already over! It started very (too?) early with Candid Wuest (Symantec) presented  “Dissecting Advanced Targeted Attacks – Separating myths from facts“. Not easy to speak so early and not a lot of people present in the room. For a while, the press plays a big role in
RSA Conference Europe Wrap-Up Day #2
This is my wrap-up of the second day of RSA Europe. As said yesterday, the panel of speakers was broader and much more interesting. Let’s go!
RSA Conference Europe Wrap-Up Day #1
I’m in London for the next three days to follow the RSA Conference Europe 2012. This is my third edition and I would like to thank the organizers for the received press pass which allows me to write this wrap up! (and the next ones in the coming days). Compared to
Digital or Analog Life, Same Issues!
We are living in a digital era and I like this! From a security point of view because it generates a lot of issues that we have to deal with (being infosec pro, it’s our daily job). But also because I like “gadgets”. We are big kids 😉 On the
OWASP Belgium Chapter September 2012 Wrap-Up
The holidays are gone, kids are back to school. For the security landscape, it means that security meetings are also back! The first OWASP Belgium Chapter was organised tonight. Here is my quick wrap-up. This time the meeting started in the afternoon with a technical workshop organised by SPION. Due to agenda conflicts, I did not
Kicking Out Bots with ModSecurity
If you are the administrator of an online forum, a wiki or any website which accepts user data, you problably also know this feeling: Bots are a pain and fighting them looks like an endless loop! Your websites are constantly scanned by bots which try to create fake accounts then
Cuckoo: Increasing the Power of Malware Behavior Reporting With Signatures
The new version (0.4) of Cuckoo, the open source  malware analysis system has been released this week. That’s a great news! The list of changes and new features is very impressive. So big that an upgrade is not recommended. In my case, I just installed a brand new Cuckoo instance.
You Just Have Been Erased! Are You Sure?
This is a never-ending story! People will never realize that once data has been published online, it is a nightmare to try to remove it. Here is another example… In parallel to this blog, I’m playing with another website called leakedin.com. The purpose is to educate people about the huge amount
Procrastination is Bad! (Also in Information Security)
Today was the last day of activity of the FBI servers which replaced the rogue DNS used by the DNSChanger malware. They allowed people infected by the virus to continue to work “as usual“. I won’t come back on this very long story. You should be back from a trip