Security/BlackHat 2012: Difference between revisions

m
Line 10: Line 10:
=== Black Hat sessions ===
=== Black Hat sessions ===


''July 25''
'''''[https://www.blackhat.com/html/bh-us-12/schedule/briefings-25.html July 25]'''''


10:15  
10:15  
Line 42: Line 42:
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Stamos The Myth of Twelve More Bytes: Security on the Post-Scarcity Internet] (Augustus III + IV) - ''joes, kang''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Stamos The Myth of Twelve More Bytes: Security on the Post-Scarcity Internet] (Augustus III + IV) - ''joes, kang''


''July 26''
'''''[https://www.blackhat.com/html/bh-us-12/schedule/briefings-26.html July 26]'''''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Shekyan Hacking with WebSockets] -''Who is attending, if anyone? Name here''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Shekyan Hacking with WebSockets] -''Who is attending, if anyone? Name here''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Shah HTML5 Top 10 Threats – Stealth Attacks and Silent Exploits] -''Who is attending, if anyone? Name here''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Shah HTML5 Top 10 Threats – Stealth Attacks and Silent Exploits] -''Who is attending, if anyone? Name here''
Confirmed users
58

edits