How much does it take to hack a mobile network?
Is electronic government secure
in the era of WikiLeaks and Anonymous?

Is SCADA hacking a Hollywood fiction
or the nowadays reality?
Internet banking: is there any chance to win
over the fraudsters?

Cyber-crimes, cyber-espionage, cyber-war: where do we draw a borderline?


Tuesday, November 26, 2013

How to Survive in the Cyberspace? PHDays IV: Searching for a New Formula

The international forum on practical security Positive Hack Days IV will take place on May 21 and 22, 2014 in the Digital October Center. We have already started preparing for the forum that held leading positions in ratings, received rewards and heard many encouraging words from information security professionals.

A lot of reports and hands-on labs from leading IS experts, as well as professional discussion, realistic contests are in store for the guests and participants of PHDays. The concept hasn't changed: maximum experience, minimum ceremonies, no advertising materials or promotion.

PHDays IV is devoted to new problems that arose before business, government and individuals as a result of the rapid development of science and technology. "For thousands of years people have been creating security mechanisms to counter various threats: they built fences, designed door locks, set up a police system. However, nowadays people resemble an infant that was left in the jungle. Figuratively speaking, there are lions, tigers, even dinosaurs all around. And we are just innocent children walking around without any proper weapon to protect ourselves," says Boris Simis, Deputy CEO at Positive Technologies.

Possible plots of civilization development

The PHDays organizers are going to discuss problems that lie beyond technological issues. What technologies can be used for surveillance and anonymizing? Where is the line between a citizen’s privacy and a state’s right of self-defense? What is the immediate forecast on discovering new vulnerabilities? What are the trends in ICSes, mobile devices and the Internet?

Sergey Gordeychik: "Now we are living in the world of cyberpunk victorious, States, corporations and criminal gangs are waging undeclared war. Computer viruses easily pass the borders of cyberworld and cause real physical damage. Billions of people cannot imagine their lives without Internet connection. The amount of world’s information is doubling every few years. Organizing new Positive Hack Days, we would like the representative of state, business, industry, and hacking society get together in a single venue and try to find new ways of survival in the cyberspace."

How to apply as a speaker 

Specialists in information security who are willing to share the results of your research or to demonstrate your skills in practical information security can apply though PHDays IV Call For Papers, which was started on November 25.

Anyone from a novice to a recognized expert in information security can apply for participation. Find the details about the format and participation rules, the list of topics we are mostly interested in as well as application submission instructions on the PHDays website.

How it was

It's worth reminding that during its existence, the forum has been attended by Bruce Schneier, a well-known cryptography expert, Datuk Mohd Noor Amin (United Nations), Vladimir Zhirinovsky, the leader of the Liberal Democratic Party of Russia and a member of the State Council, Travis Goodspeed, an engineer and radio amateur, Ruslan Gattarov, a representative of the Federation Council, Tao Wan, the founder of China Eagle Union, Georgy Gritsay from the Ministry for Communications, Nick Galbreath, the vice president of Engineering at IPONWEB, Mushtaq Ahmed from Emirates Airline, Vitaly Lyutikov (FSTEC), Marc Heuse, a researcher and developer also known as van Hauser and others.

Leading experts in information security, hackers, researchers, bloggers, journalists, students from Germany, India, Spain, Italy, Korea, the Netherlands, UAE, USA, Japan and other countries visited PHDays III last year. Among the participants were representatives of the Ministry of the Interior, FSB, the Investigative Committee, as well as of VimpelCom, Megafon, RusHydro and RSA. PHDays program included more than 50 reports, hands-on labs, sections, and round tables. Tens of thousands people watched the forum online and participated in the contests via PHDays Everywhere.

More than 2,000 of visitors from every corner of the world were gathered in the congress center located on Krasnopresnenskaya Naberezhnaya in Moscow to watch hackers breaking ATMs, stealing money from remote banking systems, taking control over ICS of a railroad. PHDays III CTF contests resembled a video game with nonlinear gameplay and real-life vulnerabilities. Moreover, during the process of detecting defects in security systems of the Labyrinth, a participant could feel himself being a part of a spy film while getting over motion detectors and other traps.

The forum speakers demonstrated the most dangerous vulnerabilities in ICS components, dashcams security flaws, defects in hundreds of thousands of surveillance cameras all over the word, security problems of ATMs and the Internet access systems used on planes.Specialists paid close attention to Positive Hack Days III. The forum also had broad resonance in IT community. You can take a look at the PHDays III movie we made:


  1. Cyber security has gone from being a diversion for amateur hackers to a legitimate business threat. Attacks on infrastructure now represent a major concern for organisations of all sizes, meaning cyber security professionals are currently in incredibly high demand – and accordingly in limited supply.
    vdr virtual data room

    1. افشین
      Benefits of The Virtual Data Rooms enable any kind of businesses to stay focused, be more smart, and bring products to market more faster, because they’ve got keys to the any kind of infrastructure that only big companies used to have.
      حسین تهی

  2. Benefits of The Virtual Data Rooms enable any kind of businesses to stay focused, be more smart, and bring products to market more faster, because they’ve got keys to the any kind of infrastructure that only big companies used to have.
    virtual data rooms business

  3. The most effective strategy to mitigate and minimise the effects of a cyber attack is to build a solid foundation upon which to grow your cyber security technology stack.

    Solution providers often tell their clients their applications are 100% compatible and will operate seamlessly with the current IT infrastructure, and for the most part, this is true. The problem arises when we start adding IT security solutions from different manufacturers regardless of the granularity of their configuration settings – technology gaps will always be present.
    And technology gaps will always appear for one simple reason: developers will always keep certain portions of their code proprietary as part of their competitive advantage. Hence, true compatibility and interoperability may only be 90%. These are known as technology gaps. It is through these gaps that attacks usually occur.

  4. If you want to get more compare and contrast essay topics examples, you should check this out! Here you can get this info, I am sure

  5. A great information of security it will be very helpful.thanks for sharing.
    BANK3005 Applied Financial Planning

  6. Thank you for your information, i hope you will make more great content like this in the future

  7. Good Post! Thank you so much for sharing this pretty post, it was so good to read and very useful

  8. Pretty nice post. I just stumbled upon your blog and wanted to say that I’ve really enjoyed browsing your blog posts

  9. Article is great, love the way you write. It really attractive. Not many people can write like you. Definitely will save this and follow you in future.

  10. is an IP address which routers like Linksys and other network brands use as an access point or gateway.

  11. Student faces many problems while doing Assignments, this problem affects student academic Grades.Online assignment writing service solve students problem, and complete their Assignments before deadline.

  12. Our Pay for custom written college papers services makes your college life bearable and also receive the best assignment writing service fulfilling by enabling you to pass your exams and also in other research and essay writing tasks.


  13. Hiya, I am really glad I have found this info. Today bloggers publish only about gossip and net stuff and this is actually irritating. A good blog with interesting content, this is what I need. Thanks for making this website, and I will be visiting again. Do you do newsletters by email?

    Vedic Astrologers in Chennai
    Vedic Astrologer in India
    Vedic Astrologer in Chennai
    Astrologer in India
    Astrology Consultant in India
    Astrology Consultant in Chennai
    Numerologist in Chennai
    Numerology Consultant
    Numerology Consultant in Chennai
    Horoscope Consultant in Chennai
    Gemstone Consultant in Chennai
    Marriage Matching in Chennai
    Vastu Consultant in Chennai

  14. I am glad that I saw this post. It is informative blog for us and we need this type of blog thanks for share this blog, Keep posting such instructional blogs and I am looking forward for your future posts.
    Cyber Security Projects for Final Year

    JavaScript Training in Chennai

    Project Centers in Chennai

    JavaScript Training in Chennai

  15. A sphygmomanometer is an instrument for measuring blood pressure, also called a Blood Pressure Monitor. According to the design principle of measuring blood pressure, there are mainly auscultatory sphygmomanometers and oscillometric sphygmomanometers. There are two types: desktop and vertical. The height can be adjusted arbitrarily.Blood Pressure Monitor

  16. Nice post Hunting is one of the best hobbies. Most of the people like to hunt wild animals.The
    Best Scope for AR 15 under $100 are high in demand these days.

  17. Keep it up! Your web page is great.I can tell you have put a lot of work into it.

    Furnace Cleaning

  18. Thank you for sharing good ideas to all your readers and continue inspiring us! This is worth it to read for everyone.

    Stereo Installation Denver NC