Archiv - Hacktivity 2013

Name Talk .pdf Video (hun) Video (eng)
Gabor Pek eNeMI: Evading the state-of-the-art hardware protection of I/O virtualization
Boldizsár Bencsáth What happened to targeted malware attacks last year?
Charlie Miller Car Hacking
Vaagn Toukharian HTTP Time Bandit
Dmitriy Chastuchin Injecting evil code in your SAP J2EE systems: Security of SAP Software Deployment Server
Csaba Krasznay Cyber soldiers in the world -- how to become a military hacker?
Paul M. Wright Oracle 12c Security - Defense and Attack
Akos Bardoczi, Lilian Zsakai Data mining in the age of social web
Dr. Sándor Péter Bartók Services of Computer Forensics Laboratories
Evgeny Neyolov Inside the illegal traffic sales
Gabor Szappanos Advanced(?) Persistent Shellcode
Robert Lipovsky The "Facebook PokerAgent"
Gergely Révay Security implications of the Cross-Origin Resource Sharing
Domonkos Tomcsanyi GSM - have we overslept the last wake-up call?
Yury Chemerkin (In-) Efficiency of security features on mobile security and compliance
Dr. Dániel Eszteri Legal Background of Cybercrime
Zane Lackey Attack-driven defense
Zoltan Balazs Alice in eXploitland, attack and defense evolution
László Miklós Bíró Tempest, the hidden source of data leakage
Tamás Jós, Attila Bogár is BitTorrent really providing anonymity?
Axelle Apvrille Playing Hide and Seek with Dalvik Executables
Laszlo Toth, Ferenc Spala What's common in Oracle and Samsung?
Charlie Miller Mobile Threats - Hype vs. Reality
Mikko Hypponen The Cyber Arms Race
Balint Varga-Perke 'Buherator' - Heureka - The Suspicious Thing Is That It's Not Suspicious
Ferenc Leitold, Ph.D Botond Horvath Protection against the C&C traffic of malware
Andras Feher, Csaba Otti Face Recognition Systems
Dr. Lajos Muha Interpretation of the Act on Information Security
Dr. Geza Tenyi Management of Confidential Information and Data Protection In Cloud Computing
Tamas Szakaly Stolen bytes on the video card -- the GPU as an anti-rce device
Akos Maroy, Tamas Bodoky Anonim whistleblowing using the GlobaLeaks platform
Tamas Szekely One a Penny, Two a Penny Hot DDoS run
Benjamin Tamasi Hacking CCTV systems