Lockpicking | t2 infosec conference https://t2.fi Sat, 16 Aug 2014 10:38:27 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.5 https://t2.fi/wp-content/uploads/2020/07/cropped-t2_web-icon-32x32.png Lockpicking | t2 infosec conference https://t2.fi 32 32 Covert entry https://t2.fi/2014/08/16/covert-entry/ https://t2.fi/2014/08/16/covert-entry/#respond Sat, 16 Aug 2014 10:38:27 +0000 http://t2.fi/?p=690 In a time where so many conferences are focusing on cybering, A/S/L and the potholes on the information superhighway, t2’14 has two speakers demonstrating how IT security and physical access walk hand in hand. For the first time in the history of t2, we have a lockpicking presentation in the program. Actually, make it two …

The post Covert entry first appeared on t2 infosec conference.]]>
In a time where so many conferences are focusing on cybering, A/S/L and the potholes on the information superhighway, t2’14 has two speakers demonstrating how IT security and physical access walk hand in hand. For the first time in the history of t2, we have a lockpicking presentation in the program. Actually, make it two – one man’s exploit is another man’s lockpick.

To prevent manufacturers from getting the wrong idea, the abstracts are vague on details – the presentations themselves will not be.

 

The post Covert entry first appeared on t2 infosec conference.]]>
https://t2.fi/2014/08/16/covert-entry/feed/ 0