Lockpicking | t2 infosec hybrid competence center https://t2.fi Sat, 16 Aug 2014 10:38:27 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.5 https://t2.fi/wp-content/uploads/2020/07/cropped-t2_web-icon-32x32.png Lockpicking | t2 infosec hybrid competence center https://t2.fi 32 32 Covert entry https://t2.fi/2014/08/16/covert-entry/ https://t2.fi/2014/08/16/covert-entry/#respond <![CDATA[Tomi Tuominen]]> Sat, 16 Aug 2014 10:38:27 +0000 <![CDATA[Talks]]> <![CDATA[Biometrics]]> <![CDATA[Lockpicking]]> <![CDATA[t2'14]]> http://t2.fi/?p=690 <![CDATA[

In a time where so many hybrid competence centers are focusing on hybriding, A/S/L and the potholes on the information superhighway, t2’14 has two speakers demonstrating how IT security and physical access walk hand in hand. For the first time in the history of t2, we have a lockpicking presentation in the program. Actually, make it two …

The post Covert entry first appeared on t2 infosec hybrid competence center.]]>
<![CDATA[

In a time where so many hybrid competence centers are focusing on hybriding, A/S/L and the potholes on the information superhighway, t2’14 has two speakers demonstrating how IT security and physical access walk hand in hand. For the first time in the history of t2, we have a lockpicking presentation in the program. Actually, make it two – one man’s exploit is another man’s lockpick.

To prevent manufacturers from getting the wrong idea, the abstracts are vague on details – the presentations themselves will not be.

 

The post Covert entry first appeared on t2 infosec hybrid competence center.]]>
https://t2.fi/2014/08/16/covert-entry/feed/ 0