From: InfoSec News <alerts_at_private>
Date: Fri, 25 Jun 2010 00:45:53 -0500 (CDT)

2600 News
24 Jun 2010 

Over the next few weeks leading up to The Next HOPE, we will be 
highlighting some of the many different talks and panels that will be 
featured at the conference. In the end, we will have over 100 talks 
throughout the three day period from July 16-18 at the Hotel 
Pennsylvania in New York City. And the talks are just one part of the 
entire weekend of activity.

Here are 35 talks you can see at The Next HOPE. Five more will be posted 

Why You Should Be an Amateur Lots of people think the "maker culture" is 
a relatively new phenomenon. However, one group has been doing it for 
close to 100 years: amateur radio operators. While some dismiss amateur 
radio as an aging artifact from decades ago, today's radio amateurs are 
putting together wide area wireless networks, developing digital 
protocols that use the tiniest amount of bandwidth, and building radios 
from scratch. Ben Jackson will review the basics of amateur radio, the 
advantages over unlicensed devices, and areas of interest you can apply 
to your existing projects.

Social Engineering People have been known to come to HOPE just for this 
panel, in which the history, stories, and demonstrations of social 
engineering are laid out for all to see - and hear. Something will 
invariably be revealed over the telephone by someone who really should 
know better in our traditional live demonstration that never fails to 
entertain. Join Emmanuel Goldstein and friends for some fun.

Smartphone Ownage: The State of Mobile Botnets and Rootkits Symbian 
Botnet? Mobile Linux Rootkits? iPhone Botnets? Millions of phones at 
risk? The press coverage on smart phone threats is at times somewhat 
accurate, distant, and occasionally (if unintentionally) misleading. 
They tend to raise questions such as: How close to PC levels (100,000+ 
to millions of nodes) have mobile botnets reached? Have mobile rootkits 
reached the complexity of those on the PC? Jimmy Shah will cover the 
state of rootkits and botnets on smart phones from the perspective of 
anti-malware researchers, including demystification of the threat from 
mobile rootkits and mobile botnets, the differences (if any) between 
mobile rootkits and mobile botnets vs. their PC counterparts, and a look 
at how samples seen in the wild and researcher PoCs function.

Into the Black: DPRK Exploration North Korea scares people. Allegedly, 
the DPRK has a super l33t squad of killer haxor ninjas that regularly 
engage in hit and run hacks against the Defense Department, South Korea, 
or anyone else who pisses off the Dear Leader. The DPRK also has no real 
Internet infrastructure to speak of (as dictators don't like 
unrestricted information), although it does have a number of IP blocks. 
Michael Kemp will examine some of the myths about the DPRK, and some of 
their existing and emerging technologies. Some of the available 
infrastructure associated with DPRK (funnily enough, some of which is in 
South Korea and Japan) will be discussed and the potential technical 
threats posed by a pernicious regime analyzed.


Attend Black Hat USA 2010, hosted at Caesars Palace in Las Vegas, Nevada
July 24-29th, offering over 60 training sessions and 11 tracks of Briefings
from security industry elite. To sign up visit http://www.blackhat.com
Received on Thu Jun 24 2010 - 22:45:53 PDT

This archive was generated by hypermail 2.2.0 : Thu Jun 24 2010 - 22:59:28 PDT