http://www.2600.com/news/view/article/11974 2600 News 24 Jun 2010 Over the next few weeks leading up to The Next HOPE, we will be highlighting some of the many different talks and panels that will be featured at the conference. In the end, we will have over 100 talks throughout the three day period from July 16-18 at the Hotel Pennsylvania in New York City. And the talks are just one part of the entire weekend of activity. Here are 35 talks you can see at The Next HOPE. Five more will be posted tomorrow. Why You Should Be an Amateur Lots of people think the "maker culture" is a relatively new phenomenon. However, one group has been doing it for close to 100 years: amateur radio operators. While some dismiss amateur radio as an aging artifact from decades ago, today's radio amateurs are putting together wide area wireless networks, developing digital protocols that use the tiniest amount of bandwidth, and building radios from scratch. Ben Jackson will review the basics of amateur radio, the advantages over unlicensed devices, and areas of interest you can apply to your existing projects. Social Engineering People have been known to come to HOPE just for this panel, in which the history, stories, and demonstrations of social engineering are laid out for all to see - and hear. Something will invariably be revealed over the telephone by someone who really should know better in our traditional live demonstration that never fails to entertain. Join Emmanuel Goldstein and friends for some fun. Smartphone Ownage: The State of Mobile Botnets and Rootkits Symbian Botnet? Mobile Linux Rootkits? iPhone Botnets? Millions of phones at risk? The press coverage on smart phone threats is at times somewhat accurate, distant, and occasionally (if unintentionally) misleading. They tend to raise questions such as: How close to PC levels (100,000+ to millions of nodes) have mobile botnets reached? Have mobile rootkits reached the complexity of those on the PC? Jimmy Shah will cover the state of rootkits and botnets on smart phones from the perspective of anti-malware researchers, including demystification of the threat from mobile rootkits and mobile botnets, the differences (if any) between mobile rootkits and mobile botnets vs. their PC counterparts, and a look at how samples seen in the wild and researcher PoCs function. Into the Black: DPRK Exploration North Korea scares people. Allegedly, the DPRK has a super l33t squad of killer haxor ninjas that regularly engage in hit and run hacks against the Defense Department, South Korea, or anyone else who pisses off the Dear Leader. The DPRK also has no real Internet infrastructure to speak of (as dictators don't like unrestricted information), although it does have a number of IP blocks. Michael Kemp will examine some of the myths about the DPRK, and some of their existing and emerging technologies. Some of the available infrastructure associated with DPRK (funnily enough, some of which is in South Korea and Japan) will be discussed and the potential technical threats posed by a pernicious regime analyzed. [...] _________________________________________________________________ Attend Black Hat USA 2010, hosted at Caesars Palace in Las Vegas, Nevada July 24-29th, offering over 60 training sessions and 11 tracks of Briefings from security industry elite. To sign up visit http://www.blackhat.comReceived on Thu Jun 24 2010 - 22:45:53 PDT
This archive was generated by hypermail 2.2.0 : Thu Jun 24 2010 - 22:59:28 PDT