BlueHat v6: The Vuln Behind The Curtain

It seems the blogposts from Bluehat v6 got under my radar. Time to pick up the slack.

BlueHat v6: The Vuln Behind The Curtain, we have two days of great security content that covers the spectrum of issues in security. The BlueHat speakers, both leading external security researchers and internal Microsoft engineers, will pierce the security veil of virtualization and process isolation. Plus, we’ve got a couple of talks on Windows Mobile and more about automated exploit creation – this time using Metasploit. There will also be a talk on a DNS pinning design issue that demonstrates how Internet Explorer can turn into a VPN concentrator. All this--and talks on Office, Binary Instrumentation, Visualization and the Economics of Security!


You can now share in a bit of my experience and listen to audio podcast interviews with many of the speakers. I had the pleasure of sitting down with each of our visitors to discuss topics such as the mobile threat landscape, and automated fuzzing frameworks.

If you want more resources about Virtualization security, check out my previous post Big Update on virtualization security

No comments: