Blog

Focus Theme E-Voting

Posted:

“With all its distinct and partly contradictory security requirements and goals, electronic voting is the supreme discipline among secure communication protocols.” This is what University of Zurich associate Professor Rolf Oppliger told me when we discussed E-Voting last year. He went on to explain that online banking needs strong authenticatio... continue reading

Introducing Swiss Cyber Storm 2017 Speaker Stefan Lüders

Posted:

There is no business case for securing IoT hardware. There is no legislation and no incentive to lock it down. But there is a lot of legal knowledge how a manufacturer can sneak out of the responsibility via extensive EULAs. Our industry has been having great fun dissecting electronic scales, smart toothbrushes and even IoT egg containers (here ... continue reading

Introducing Swiss Cyber Storm 2017 Speaker Clément Guitton

Posted:

There have been a few statements by Swiss politicians lately, trying to funnel more money into the army to grow real cyber units with extensive attack capabilities. Initiatives as this have been around for a while and usually I do not bother, but the statements are growing more systematic in recent weeks. On top of it, they coincidence with the ... continue reading

Introducing Swiss Cyber Storm 2017 Speaker Dhia Mahjoub

Posted:

When we think of Bulletproof Hosting, we usually think of shady firms in the style of the Russian Business Network that dodge all inquiries and take-down notices from governments and potentially operating in corrupt legislations where such behaviour is accepted. Nowadays, this traditional centralized Bulletproof Hosting no longer works, although... continue reading

Introducing Swiss Cyber Storm 2017 Speaker Daniela Oliveira

Posted:

There is a shift in the world of IT security. Back in the 1990ties, people thought security was a purely technical if not mathematical problem. In one of his more famous quotes, Bruce Schneier stated that having written “Applied Cryptography” he really thought, that security was solved since he had just told the world how to apply encryption. ... continue reading

Introducing Swiss Cyber Storm 2017 Keynote Speaker Paul Vixie

Posted:

We are very proud to have Paul Vixie as our keynote speaker. I do not need to tell you about Paul’s greatness or about the fact that he is a veteran with over 30 years in the IT industry. But let me tell you about two things that I think striking: Paul has been introduced to the Internet Hall of Fame Paul runs a company called Farsight Sec... continue reading

Introducing Swiss Cyber Storm 2017 Speaker Jos Wetzels

Posted:

The internet of things is all the rage and talks about the insecurity of smart devices and tech assistants are a constant companion at tech conferences these days. But it’s also a bit boring in the sense that the whole audience knows IoT is insecure and the presentations are often déjà-vus of stupid mistakes on cheap devices. Jos Wetzels, Sec... continue reading

Introducing Swiss Cyber Storm 2017 Speaker Tarah Wheeler

Posted:

Tarah Wheeler can be really vocal when it comes to gender equality, workplace diversity and American politics in general. She is a thought leader and we could fill a conference with Tarah explaining her view on all these topics. But then you could also read her book about Women in Tech or ask her directly. At Swiss Cyber Storm she will speak as ... continue reading

Introducing Swiss Cyber Storm 2017 Speaker Tanya Janca

Posted:

Imagine me attending the OWASP Application Security Europe conference two weeks ago; the Swiss Cyber Storm program was almost full, but I really wanted to have another addition to the management track. Security DevOps sounded ideal and AppSecEU was running a two day track with SecDevOps and DevSecOps. Although I can not really tell the two apart... continue reading

Introducing_deviant_ollam

Posted:

layout: post title: Introducing Swiss Cyber Storm 2017 Speaker Deviant Ollam header_image: blog.jpg — At Swiss Cyber Storm 2016, Walter Belgers from TOOOL Netherlands presented lock-picking as a metaphor of IT security hacking. This years speaker Deviant Ollam is Walter’s counterpart in TOOOL United States. He has been called the godfather of... continue reading

SCS Challenges Reloaded

Posted:

The waiting has finally come to an end. Sign up today for the Swiss Cyber Strom Security Challenges 2017. The SCS is waiting for  you . Talents with best scores are invited to the Swiss final in Sursee where we evaluate the Swiss national team. The Swiss team will compete against other European teams in the run of the European Cyber Secu... continue reading

A first glimpse at the program of the SCS Conference 2017

Posted:

We had a few impressive talks at Swiss Cyber Storm 2016. Troy Hunt surprised me regarding his diligence with everything around account breaches. John Matherly / Shodan and Marc Ruef with his Dark Net talk hit it home in a perfect way. I was very happy that Nick Galbreath’s talk resonated with so many people in the room who had never heard his n... continue reading

Steroids for hackers - Swiss Cyber Challenges 2017

Posted:

The schedule for the SCS Challenges 2017 has been launched. Register today on our challenges page. You don’t know the SCS Challenges? Are you born in 1992 or later? Working with computers and networks is your passion and you are not (yet) a security professional? Then the European Cyber Security Challenge is for you! You have to solve security... continue reading

End of final qualifying 2016

Posted:

International Hacker Competition: Europe is preparing against cyber threats Last night, the national qualification phase of this year’s “European Cyber Security Challenge” ended. The 20 best young hackers in Switzerland have been identified and are competing for entry into the European finale in Dusseldorf. The annual hacker competition is an ... continue reading

Flyer of the European Cyber Championship 2016

Posted:

Already exited about the European Cyber Championship 2016? Share your passion with collegues. Please find below the flyer for the upcoming event German flyer, Frensh flyer, Italian flyer. Stay tuned for more information about this years conference and watch out for news about the Cyber Security Challenges! continue reading

Start of the European Cyber Championship 2016

Posted:

Starting Monday morning, things get serious for young Swiss hackers: the national qualifications phase for the European Cyber Security Challenge of 2016 opens. Young talents between the ages of 14 and 30 have the possibility of qualifying for the Swiss National Team and competing against other nations in the European finals in Düsseldorf. The c... continue reading

Get ready for Hacky Easter

Posted:

HackyEaster will start tomorrow! The best chance to get prepared for the Swiss Cyber Challenges. Lots of funny puzzles and challenges are waiting for you. Get enspired by the last years events HackyEaster 2014 and HackyEaster 2015. HackyEaster 2016 will be a month of excitement, fun and learning. Stay tuned for more information about this ye... continue reading

New Hacking-Lab LiveCD 9-05 Released

Posted:

The new Hacking-Lab 9-05 LiveCD has been released today. The new build is supporting 32 bit binaries, plus we added remmina RDP client. Please update by following the instructions on http://media.hacking-lab.com/tips/update/ or by downloading the new OVA for your preferred hypervisor. Further information are provided here. Details for the On... continue reading

Hacking-Lab LiveCD

Posted:

To get started solving real hacking challenges you want to dive into the world of the Hacking-Lab. The Hacking-Lab LiveCD is a full fledged pre-configured OVA appliance for Vmware or VirtualBox based on Debian Live with Kali support. It will give you a jump start in accessing the Hacking-Lab-Universe and it is free. Please find here some tips... continue reading

Subscribe via RSS