How much does it take to hack a mobile network?
Is electronic government secure
in the era of WikiLeaks and Anonymous?

Is SCADA hacking a Hollywood fiction
or the nowadays reality?
Internet banking: is there any chance to win
over the fraudsters?

Cyber-crimes, cyber-espionage, cyber-war: where do we draw a borderline?

Pages

Friday, March 22, 2013

PHDays Call For Papers Initiates Its Second Stage

With only two months and a half left, the information security forum Positive Hack Days will throw its doors open in World Trade Center Moscow. This year the forum will host 2,000 information security experts from all over the world. If you want to share the results of your research or you have something to tell the community about, then we are looking forward to seeing you as a speaker at PHDays.

You have a chance to apply for participation in PHDays III till the end of the second stage of Call For Papers, which will be closed on April 14, 2013. The first stage has made it clear who will definitely speak at the forum.

Reports

Among special guests of the forum are Travis Goodspeed from the USA, Donato Ferrante and Luigi Auriemma, founders of ReVuln known for their researches in information security of SCADA and Smart TV.

Anonymous and Bnonymous will show how the Internet works on the board of an aircraft and will attack a mysterious box with a screen on the back of a passenger seat.

Mushtaq Ahmed, a specialist of the IT Security & Risk Management department in Emirates Airline, will take a look at the issues of information security from within a large company and will cover various application security aspects, as well as flaws in business process management that can have a pernicious effect on the business effectiveness.

Tao Wan, also known as Eagle Wan, the leader of the China Eagle Union, will speak about hackers in China. He will tell who they are, what they want, and what happened to them in the last ten years.

Hackers' services are actively sold and bought today. Max Goncharov, Senior Threat Analyst at Trend Micro, will cover the principles of underground information exchange, ways to secure money/goods in underground transactions and basic cyber hierarchy. Crypt services, DDoS attacks, traffic resale, bulletproof servers, SMS fraud, spam services and credit card hijack — these topics will also be covered.

A recent New York Times compromise incident and other financially-oriented online crime activities will become a ground for the report of Vladimir Kropotov, Vitaliy Chetvertakov, and Fyodor Yarochkin. Their report Catching the Uncatchable: Investigating Malicious Activity Incidents in Corporate Networks will cover malicious activity outbreaks in large corporate networks.

Jeff Katz will speak about the most recent findings of the OpenBeacon project and will demonstrate a system able to track location in a real-time mode. The authors have already tried it during several conferences and obtained interesting results.

The forum will also see Alexey Demenyuk (a founder of FixedBug), Dmitry Nedospasov (a specialist of Berlin University of Technology and Deutsche Telekom), Thorsten Schröder (Keykeriki developer), and other participants.

Other topics of PHDays III: methods to overcome DLP systems, NFC new threats, bulletproof servers, cloud reputation systems, current research in SIEM systems, abusing browser user interfaces for fun and profit, programmable logic and high-end bank spy for smartphones.

Hands-on-labs

Hours-long hands-on labs will take a special place in the program of PHDays III. In-depth analysis of capabilities and inner workings of Sqlmap will be presented in the hands-on lab named Sqlmap — Under the Hood held by Miroslav Štampar.

How to develop a secure web application and stay in mind? Vladimir Kochetkov, an expert of Positive Research Center, will answer this question. His hands-on lab will cover issues of web application security on the stages of designing, development, testing, and implementation.

Alexander Sverdlov, in his turn, will speak about network and data memory forensics, as well as about disk image forensics with OSForensics (free version).

You have a chance to join the well-known experts and present your report at Positive Hack Days. See applying details here: http://phdays.com/program/call_for_papers/.

See you at PHDays III!

No comments:

Post a Comment