Content deleted Content added
→Past Conferences: +Peter Gutmann picture |
m →Past Conferences: added date to picture |
||
Line 23:
*[https://2014.kiwicon.org/ 2014] - "It's always 1989 in Computer Security" / "Hackers just wanna have fun"<ref>{{Cite web|url=https://www.nzherald.co.nz/nz/top-hacker-exposes-home-detention-bracelet-flaw/VVMXJORWJJQH3JCAOAE7PQ3KKU/|title=Top hacker exposes bracelet flaw|website=NZ Herald}}</ref><ref>{{Cite web|url=https://www.stuff.co.nz/the-press/news/transport/9388291/Hacker-divulges-cards-failings|title=Hacker divulges card's failings|first=RACHEL|last=YOUNG|date=November 12, 2013|website=Stuff}}</ref><ref>{{Cite web|url=https://www.theregister.com/2014/12/11/your_data_stolen_through_pixels/|title=Your data: Stolen through PIXELS|first=Darren|last=Pauli|website=www.theregister.com}}</ref> - 11-12 December
*[https://2015.kiwicon.org/ 2015] - "Cyberwar Is Hell"<ref>{{Cite web|url=https://www.catalyst-au.net/blog/kiwicon-9-cyberwar-hell|title="Kiwicon 9: Cyberwar is hell"|access-date=2016-05-26|archive-date=2016-06-11|archive-url=https://web.archive.org/web/20160611080444/https://www.catalyst-au.net/blog/kiwicon-9-cyberwar-hell|url-status=dead}}</ref> - 10-11 December
[[File:Kawaiicon_2019_Peter_Gutmann.jpg|thumb|[[Peter Gutmann (computer scientist)|Peter Gutmann]] speaking at the first Kawaiicon (2016).]]
*[https://2016.kiwicon.org/ 2016] - "The Truth is In Here"
Kiwicon X was at the larger [[Michael Fowler Center]] with almost 2,000 attendees, on 15-18 November 2016. Talk topics included radiation-induced cryptographic failures, a story of [[active incident response]] against attacks on [[Pacnet]] from [[Telstra]] researchers, a [[phishing]] automation tool, benefits of [[application virtualization|containers]] enabling an application to contain itself, the disconnect between security and business, spoofing [[GPS]] by changing the time, why [[machine learning]] exploitation is good, a history of [[lockpicking]], remote activation of swipe-card readers, and exploits for iClass [[RFID]], [[Graphical user interface|GUI]]s, [[macOS]], [[web application#hybrid apps|native web-based application]]s, [[PHP]] 7, insecure [[random number generation]], [[Amazon Web Services]], infrared devices, [[NodeJS]], and HTML _blank.
|