A round-up of articles leading up to and live coverage from Black Hat USA 2012, July 21-26, Las Vegas
Jun 15, 2012 | 11:30 AM |
0 Comments
By Dark Reading Staff
>> Black Hat Releases Complete Event Schedule
Among the news breaking will be 36 tools, 17 0-days, and 49 live on-stage demonstrations
Among the news breaking will be 36 tools, 17 0-days, and 49 live on-stage demonstrations
Black Hat, producer of the
world's premier information security events, today announced the
official schedule for Black Hat USA 2012, where the smartest and most
disruptive cyber security professionals will reveal research and
vulnerabilities that threaten national critical infrastructure and
identify flaws in popular consumer devices. Among the news breaking will
be 36 tools, 17 0-days and 49 live onstage demonstrations during the
action packed week of July 21-26 2012 in Las Vegas. For more information
and to register, visit Black Hat.
The keynote speakers at Black Hat USA 2012 include Neal Stephenson, one
of the world's foremost historical and science fiction authors, and
Shawn Henry, former FBI Executive Assistant Director (EAD) and currently
President of CrowdStrike Services. Neal will take the stage for an
interactive interview with attendees while Shawn will offer new insights
on how a hostile cyber environment has rendered traditional security
obsolete in a talk entitled: "Changing the Security Paradigm…Taking Back
Your Network and Bringing Pain to The Adversary."
Black Hat USA 2012 will feature talks that point out key security vulnerabilities in global and national infrastructure, including:
Threats to air traffic control systems (Andrei Costin), smart meters and the power grid (Don Weber). Stephen Ridley and Stephen Lawler will address advanced ARM exploitation and share some anecdotal "hardware hacking" experiences. Yann Allain and Julien Moinard will discuss power analysis of embedded systems. Methods for taking cyber security on the offensive: Renowned security researcher Dan Kaminsky will offer a look at "black ops," offering insight on attack techniques that previously may have been considered 'wrong and evil.' Robert Clark, operational attorney for the U.S. Army Cyber Command, will offer a look at the legal aspects of cyberspace operations. Apple operating systems and applications: speakers will discuss flaws in the Apple AppStore (Justin Engler, Seth Law, Joshua Dubik, and David Vo); vulnerabilities in the operating system kernel that drives IOS and Mac OS X (Stefan Esser); and a workshop on the dark art of IOS application hacking (Jonathan Zdziarski). Threats and vulnerabilities to the most commonly used Web applications and tools, demonstrating key vulnerabilities at the very core of today's Internet. Sheeraj Shah offers a look at the Top 10 threats, while Sergey Shekyan and Vaagn Toukharian discuss hacking with HTML5's WebSockets; a look at recent Java exploitation trends and malware (Jeong Wook Oh); and the revelation of several new vulnerabilities in popular Web application firewalls (Ivan Ristic).
Black Hat will feature nine concurrent tracks every day, mixing workshops, roundtables and cutting edge presentations by top security experts. Deep technical training will take place July 21-24, while the open briefings will run from July 25-26.
Black Hat on Facebook; Black Hat on LinkedIn; #BlackHatEvents on Twitter; Black Hat Events on Flickr.
Sponsors of this year's Black Hat include Diamond Sponsors Qualys, Microsoft and Lookingglass Cyber Solutions; Platinum Sponsors Accuvant LABS, Blue Coat Systems, Core Security, Cisco, IBM, Juniper Networks, LogRhythm, RSA, Symantec, Trustwave and Verizon.
About Black Hat
Black Hat provides briefings and training to leading corporations and government agencies around the world. Black Hat differentiates itself by working at many levels within the corporate, government, and underground communities. This unmatched informational reach enables Black Hat attendees to be continuously aware of the newest vulnerabilities, defense mechanisms, and industry trends. Black Hat Briefings and Trainings are held annually in Europe and Las Vegas. Black Hat is produced by UBM TechWeb. More information is available at www.blackhat.com.
About UBM TechWeb
UBM TechWeb, the global leader in technology media and professional information, enables people and organizations to harness the transformative power of technology. Through its three core businesses – media solutions, marketing services and paid content – UBM TechWeb produces the most respected and consumed brands and media applications in the technology market. More than 14.5 million business and technology professionals (CIOs and IT managers, Web & Digital professionals, Software Developers, Government decision makers, and Telecom providers) actively engage in UBM TechWeb's communities and information resources monthly. UBM TechWeb brands include: global face-to-face events such as Interop, Black Hat and Enterprise Connect; award-winning online resources such as InformationWeek, Dark Reading, and Network Computing; and market-leading magazines InformationWeek, Wall Street & Technology, and Advanced Trading. UBM TechWeb is a UBM plc. company, a global provider of news distribution and specialist information services with a market capitalization of more than $2.5 billion.
>> Malware 'Licensing' Could Stymie Automated Analysis
The use of encryption and digital-rights management techniques by the authors of malicious code could make automated analysis of malware take longer and require human intervention more often
>> Security Teams Need Better Intel, More Offense
Adversaries go through five steps to prepare and execute an attack, but defenders only react to the last two steps. It's time for defenders to add intelligence gathering, counterintel, and even offense to the game, security experts say
Click here for more of Dark Reading's Black Hat articles. |
Black Hat USA 2012 will feature talks that point out key security vulnerabilities in global and national infrastructure, including:
Threats to air traffic control systems (Andrei Costin), smart meters and the power grid (Don Weber). Stephen Ridley and Stephen Lawler will address advanced ARM exploitation and share some anecdotal "hardware hacking" experiences. Yann Allain and Julien Moinard will discuss power analysis of embedded systems. Methods for taking cyber security on the offensive: Renowned security researcher Dan Kaminsky will offer a look at "black ops," offering insight on attack techniques that previously may have been considered 'wrong and evil.' Robert Clark, operational attorney for the U.S. Army Cyber Command, will offer a look at the legal aspects of cyberspace operations. Apple operating systems and applications: speakers will discuss flaws in the Apple AppStore (Justin Engler, Seth Law, Joshua Dubik, and David Vo); vulnerabilities in the operating system kernel that drives IOS and Mac OS X (Stefan Esser); and a workshop on the dark art of IOS application hacking (Jonathan Zdziarski). Threats and vulnerabilities to the most commonly used Web applications and tools, demonstrating key vulnerabilities at the very core of today's Internet. Sheeraj Shah offers a look at the Top 10 threats, while Sergey Shekyan and Vaagn Toukharian discuss hacking with HTML5's WebSockets; a look at recent Java exploitation trends and malware (Jeong Wook Oh); and the revelation of several new vulnerabilities in popular Web application firewalls (Ivan Ristic).
Black Hat will feature nine concurrent tracks every day, mixing workshops, roundtables and cutting edge presentations by top security experts. Deep technical training will take place July 21-24, while the open briefings will run from July 25-26.
Black Hat on Facebook; Black Hat on LinkedIn; #BlackHatEvents on Twitter; Black Hat Events on Flickr.
Sponsors of this year's Black Hat include Diamond Sponsors Qualys, Microsoft and Lookingglass Cyber Solutions; Platinum Sponsors Accuvant LABS, Blue Coat Systems, Core Security, Cisco, IBM, Juniper Networks, LogRhythm, RSA, Symantec, Trustwave and Verizon.
About Black Hat
Black Hat provides briefings and training to leading corporations and government agencies around the world. Black Hat differentiates itself by working at many levels within the corporate, government, and underground communities. This unmatched informational reach enables Black Hat attendees to be continuously aware of the newest vulnerabilities, defense mechanisms, and industry trends. Black Hat Briefings and Trainings are held annually in Europe and Las Vegas. Black Hat is produced by UBM TechWeb. More information is available at www.blackhat.com.
About UBM TechWeb
UBM TechWeb, the global leader in technology media and professional information, enables people and organizations to harness the transformative power of technology. Through its three core businesses – media solutions, marketing services and paid content – UBM TechWeb produces the most respected and consumed brands and media applications in the technology market. More than 14.5 million business and technology professionals (CIOs and IT managers, Web & Digital professionals, Software Developers, Government decision makers, and Telecom providers) actively engage in UBM TechWeb's communities and information resources monthly. UBM TechWeb brands include: global face-to-face events such as Interop, Black Hat and Enterprise Connect; award-winning online resources such as InformationWeek, Dark Reading, and Network Computing; and market-leading magazines InformationWeek, Wall Street & Technology, and Advanced Trading. UBM TechWeb is a UBM plc. company, a global provider of news distribution and specialist information services with a market capitalization of more than $2.5 billion.
>> Malware 'Licensing' Could Stymie Automated Analysis
The use of encryption and digital-rights management techniques by the authors of malicious code could make automated analysis of malware take longer and require human intervention more often
>> Security Teams Need Better Intel, More Offense
Adversaries go through five steps to prepare and execute an attack, but defenders only react to the last two steps. It's time for defenders to add intelligence gathering, counterintel, and even offense to the game, security experts say