Microsoft BlueHat Blog
Search this blog
Search all blogs
View More Blogs
Microsoft Accessibility Blog
Microsoft BlueHat Blog
Microsoft Malware Protection Center Blog
Microsoft Security Blog
Microsoft Security Response Center Blog
Security Development Lifecycle Blog
Security Research & Defense Blog
Security Tips & Talk Blog
Trustworthy Computing Blog
Microsoft BlueHat Blog
BlueHat Security Briefings
Cloud Computing Privacy
Defend the Flag
End to End Trust
Internet Explorer (IE)
Malicious Software (Malware)
Microsoft Active Protections Program (MAPP)
Microsoft Vulnerability Research (MSVR)
MSRC Ecosystem Strategy
Security Conference Engagement
Security Development Lifecycle (SDL)
Security Intelligence Report
Browse by Tags
Getting Into Information Security Intelligence Gathering: A BlueHat v10 Retrospective from Speakers Ian Iftach Amit and Fyodor Yarochkin
Ian: Having a mild case of "professional ADHD" is probably what got me started on this whole "cyber" thing. Having done research, development, integration and consulting in the past, I was starting to get too many unanswered questions in my mind when dealing with customers and individuals who were being...
2 Nov 2010
Internet troubles in Korea? E-call center 118 is there to help.
Handle: Cluster IRL: Maarten Van Horenbeeck Rank: Senior Program Manager Likes: Slicing covert channels, foraging in remote memory pools, and setting off page faults Dislikes: The crackling sound of crypto breaking, warm vodka martni Microsoft often has the pleasure of welcoming foreign...
17 Sep 2010
May You Live in Interesting Times
Handle: StoneZ IRL: Adrian Stone Rank: Senior Security Program Manager Lead Likes: Predictive Analytics, Game Theory, Databases, Sports Cars, NFL Football, Direct People Dislikes: Losing, Liars, Posers, No Talent Clowns It was two years ago at Black Hat that my colleague Katie Moussouris...
29 Jul 2010
Heya! Hola and Olá!
It was pretty fun sitting in the panel that kicked-off the first BlueHat Security Forum in Latin America and we are almost half-way through our day here in Buenos Aires. (Check out Mike Reavey’s EcoStrat Blog post for details about the panel.) It is always great to see old friends from the ecosystem...
18 Mar 2010
BlueHat Security Forum: Buenos Aires Edition--Shipping!
Handle: Silver Surfer IRL: Mike Reavey Rank: Director, MSRC Likes: Warm weather, Battlestar Galactica, and responsibly reported vulnerabilities Dislikes: Rain, Rain without end, Clouds with potential for rain, reality TV, and unpatched vulns I’m here at the second edition of the...
18 Mar 2010
Who Gets It and Who Doesn’t? (Windows Genuine Advantage and Security Updates)
Handle: Mando Picker IRL: Dustin Childs Rank: Security Program Manager Likes: Protecting customers, working with security researchers, second Tuesdays, bourbon, mandolins Dislikes: Using "It's hard" as an excuse, quitting when it gets tough, banjos One of the things I get to do in the...
11 Mar 2010
Ahn-young-ha-seh-yo & Kon-ni-chi-wa
Handle: Cap'n Steve IRL: Steve Adegbite Rank: Senior Security Program Manager Lead Likes: Reverse Engineering an obscene amount of code and ripping it up on a snowboard Dislikes: Not much but if you hear me growl…run Hi! It's been a while since I've had a chance to blog about all the things...
23 Nov 2009
Know thy Enemy
I recently attended BlueHat for the second time and spoke about the SMS vulnerabilities Collin Mulliner and I discovered and exploited this summer. BlueHat is an interesting speaking venue because the audience consists entirely of Microsoft employees. Some people might think security researchers speaking...
6 Nov 2009
This year at BlackHat USA in Las Vegas , we presented on the topic of attacking Short Message Service (SMS). Our presentation focused on the different ways in which SMS can be used to compromise mobile security. We’re excited to give an updated version of our talk at the upcoming BlueHat v9 conference...
19 Oct 2009
Collaborating on RIA Security
Microsoft and Adobe frequently work together on security. At this year's BlueHat , we will come together to share our security research in the area of Rich Internet Applications (RIAs). While we independently place considerable thought and effort into our respective security models, attackers often look...
6 Oct 2009
Announcing BlueHat v9: Through the Looking Glass
Handle: C-Lizzle IRL: Celene Temkin Rank: Program Manager 2 & BlueHat Project Manager Likes: Culinary warfare, BlueHat hackers and responsible disclosure Dislikes: Acts of hubris, MySpace, orange mocha Frappaccinos! BlueHat v9 will take place from October 21 to 23 at the Microsoft campus...
14 Sep 2009
心の会合: The Gathering
Handle: Cap'n Steve IRL: Steve Adegbite Rank: Senior Security Program Manager Lead Likes: Reverse Engineering an obscene amount of code and ripping it up on a snowboard Dislikes: Not much but if you hear me growl…run Konnichiwa! I guess you are wondering why I said hello in Japanese...
17 Jul 2009
Securing our Legacy
Hi, this is Scott Stender from iSEC Partners. I recently had the privilege of speaking at Microsoft's BlueHat event in Brussels on the topic of securing legacy systems. With all of the recent coverage on the need to secure our networked systems -- national, corporate, and individual alike -- I felt...
19 Jun 2009
A Brussels retrospective from Oahu
Handle: Security Blanki IRL: Sarah Blankinship Rank: Senior Security Strategist Lead Likes: Vuln wrangling, teams of rivals, global climate change - the hotter the better Dislikes: Slack jawed gawkers (girls are geeks too!), customers @ risk, egos Aloha from the Shakacon III , a security...
12 Jun 2009
Getting a business degree as part of Security Research?
What a great time to start thinking of travel – the weather is fairing up, June is here, and fortunately for me, I have a chance to take the driver seat again at another BlueHat conference! This time it’s in Brussels and I’m really looking forward to talking again about one of my favorite topics (eCrime...
2 Jun 2009
Announcing the BlueHat Security Forum: EU Edition
Handle: C-Lizzle IRL: Celene Temkin Rank: Program Manager 2 & BlueHat Project Manager Likes: Culinary warfare, BlueHat hackers and responsible disclosure Dislikes: Acts of hubris, MySpace, orange mocha Frappaccinos! Hey folks! I know this is typically the time of year when birds are...
2 Jun 2009
Dune Busting and Browser Fun at HITB – Dubai
Hi, Billy Rios here, I was recently invited to speak at Hack in the Box (HITB) in Dubai. While at HITB, I participated in two different talks, but I’m going to focus on the talk Chris Evans and I co-presented: “Cross Domain Leakiness.” Chris Evans is a security lead for Google’s Core Security team. Some...
13 May 2009
Gone is the era of yes/no questions
It used to be easy to be in the security industry. All you had to do is develop products that needed to say “nay” or “yay” on a given content and “bless” it to be secure or not. That is so 2007… As we have been witnessing during a turbulent 2008 (and yes – it actually started in 2007…) nowadays the ability...
4 Feb 2009
Good Things Come in Blue Packages
Hello everyone, Celene Temkin here from the MSRC Ecosystem Strategy Team . BlueHat v8: C3P0wned ended a month ago and the success of the con lives on in the outstanding training and networking done between Microsoft employees and external speakers and guests. I'm happy to say the speaker video interviews...
21 Nov 2008
State of the Union
I spent a lot of time trying to think about what to write for a BlueHat pre-conference blog entry and had a pretty hard time focusing on one topic. To handle this, I decided to comment on the state of security. While I've found plenty of things to be excited about with security, including improved...
17 Oct 2008
© 2014 Microsoft Corporation.
Privacy & Cookies