2009th
2009
-
Dec 05-
Clubhack-
Talk-
Risk Based Penetration Testing-
-
Nikhil Wagholikar, K K Mookhey -
Dec 05-
Clubhack-
Talk-
Revealing the Secrets: Source Code Disclosure, Techniques and Impacts-
-
Anant Kochhar -
Dec 05-
Clubhack-
Talk-
Open source for securing data with advanced Crypto-Steganography technology-
-
Suhas Desai -
Dec 05-
Clubhack-
Talk-
Mobile Application Security Testing-
-
Gursev Singh Kalra -
Dec 05-
Clubhack-
Talk-
Lust 2.0 β Desire for free WiFi and the threat of the Imposter-
-
Lavakumar Kuppan -
Dec 05-
Clubhack-
Talk-
Indian IT Act 2000 vs 2009-
-
Rohas Nagpal -
Dec 05-
Clubhack-
Talk-
Incident Handling and Log Analysis for Web Based Incidents-
-
Manindra Kishore -
Dec 05-
Clubhack-
Talk-
Advance Computer Forensic concepts (windows)-
-
Kush Wadhwa -
Dec 05-
Clubhack-
Talk-
India Cyber Crime Scene - Caught in the Crossfire-
-
Vinoo Thomas, Rahul Mohandas -
Dec 04-
Clubhack-
Talk-
Facilitate Collaboration with Information Rights Management-
Abhijit Tannu
-
Nov 19-
Deepsec-
Talk-
Top 10 Security Issues Developers Don’t Know About-
-
Neelay S Shah -
Nov 19-
Deepsec-
Talk-
Ownage 2.0-
-
Saumil Shah -
Nov 18-
Securitybyte-
Talk-
Rumbling Infections β Web Malware Ontology-
-
Aditya K Sood -
Nov 18-
Securitybyte-
Talk-
Risk based Penetration Testing-
-
K K Mookhey -
Nov 18-
Securitybyte-
Talk-
Introduction to Web Protection Library-
-
Anil Chintala -
Nov 18-
Securitybyte-
Talk-
Hacking Oracle From Web-
-
Sumit Siddharth -
Nov 18-
Securitybyte-
Talk-
Cloud Hacking β Distributed Attack & Exploit Platform-
Shreeraj Shah
-
Nov 17-
Securitybyte-
Talk-
Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors-
-
Nitin Kumar, Vipin Kumar -
Nov 17-
Securitybyte-
Talk-
Usability and Privacy in Security-
-
Ponnurangam Kumaraguru -
Nov 17-
Securitybyte-
Talk-
Threat Modeling-
-
Varun Sharma -
Nov 17-
Securitybyte-
Talk-
Lust 2.0 β Desire for free WiFi and the threat of the Imposter-
-
Lavakumar Kuppan -
Nov 17-
Securitybyte-
Talk-
Business Continuity Case Study-
Venkataram Arabolu
-
Nov 17-
Securitybyte-
Talk-
Business Case-Risk Management/Compliance at AMITY-
Js Sodhi
-
Nov 17-
Securitybyte-
Talk-
Behind the scenes at the MSRC-
-
Suresh Venkateswaran, Dave Midturi -
Nov 17-
Securitybyte-
Talk-
Applications - The new cyber security frontier-
-
Mano Paul -
Oct 28-
Hacklu-
Talk-
Ownage 2.0-
Saumil Shah
-
Oct 07-
Hitbsecconf-
Talk-
How to Own the World β One Desktop at a Time-
-
Saumil Shah -
Aug 06-
C0c0n-
Talk-
Network Intrusions and Hacking-
Manu Zacharia
-
Aug 06-
C0c0n-
Talk-
Microsoft Security Strategies-
Binoy VC
-
Aug 06-
C0c0n-
Talk-
Management & Security of Large Scale Storage Devices-
Prashant Dinde
-
Aug 06-
C0c0n-
Talk-
Know Your Enemy, and Yourself: Demystifying Threat Modelin-
Meera Subbarao
-
Aug 06-
C0c0n-
Talk-
Information Warfare-
A a Gafoor, Vinayak Mishra
-
Aug 06-
C0c0n-
Talk-
Information security management practices - Technical issues and the impact of risk management.-
Kp Paulson
-
Aug 06-
C0c0n-
Talk-
Information Security Audit-
Venkatapathy Subramaniam
-
Aug 06-
C0c0n-
Talk-
Cyber Victimisation-
K Jaishankar
-
Aug 06-
C0c0n-
Talk-
Cyber Forensics-
Krishna Sastry Pendyal
-
Aug 02-
Defcon-
Talk-
Wi-Fish Finder: Who Will Bite the Bait-
-
Md Sohail Ahmad, Prabhash Dhyani -
Aug 01-
Defcon-
Talk-
The Making of the second SQL injection Worm-
-
Sumit Siddharth -
Jul 31-
Defcon-
Talk-
Advancing Video Application Attacks with Video Interception, Recording, and Replay-
-
Arjun Sambamoorthy, Jason Ostrom -
Jul 29-
Blackhat-
Talk-
Psychotronica: Exposure, Control, and Deceit-
-
Nitesh Dhanjani -
May 19-
Syscan-
Talk-
Securing Enterprise Applications-
Shreeraj Shah
-
May 19-
Syscan-
Talk-
Securing Applications at Gateway with Web Application Firewalls-
Shreeraj Shah
-
Apr 22-
Hitbsecconf-
Talk-
Vbootkit 2.0: Attacking Windows 7 via Boot Sectors-
-
Nitin Kumar, Vipin Kumar -
Apr 22-
Troopers-
Talk-
SQL Injections: More Fun and Profit-
-
Sumit Siddharth -
Apr 22-
Hitbsecconf-
Talk-
Pwnage 2.0-
-
Saumil Shah -
Apr 22-
Troopers-
Talk-
Browser Design Flaws β Hacking by Breaking in Architectures-
-
Aditya K Sood -
Apr 22-
Hitbsecconf-
Talk-
Application Defense Tactics & Strategies - WAF at the Gateway-
-
Shreeraj Shah -
Mar 16-
Cansecwest-
Talk-
On Approaches and Tools for Automated Vulnerability Analysis-
-
Tanmay Ganacharya, Abhishek Singh, Swapnil Bhalode, Nikola Livic, Scott Lambert -
Feb 19-
Blackhat-
Talk-
Blinded by Flash: Widespread Security Risks Flash Developers Don’t See-
-
Prajakta Jagdale
β