PlumberCon 10 - Call for Papers

PlumberCon 10 - Call for Papers


PlumberCon 10 - Call for Papers

Posted:

InfoSec News: PlumberCon 10 - Call for Papers: Forwarded from: astera <astera (at) plumbercon.org>
PlumberCon 10 Call For Participation
====================================
The Call For Papers for PlumberCon 10, 2nd edition, taking place in Vienna (Austria) is now open!
This year the conference will be held from July 09th - 11th (Fri - Sun) - in other words, the week between HitB Amsterdam and The Next H.O.P.E.
Introduction PlumberCon is a very unique hacker conference targeted at security researchers, system and network operators, application developers, hardware hackers, hackerspace members, and generally open-minded folks working or participating in the broad fields between information warfare and digital art.
It will combine the knowledge of experienced security speakers, hackers, and information warriors with the fun of a small but 1337 conference at one of Vienna's most comfy & snugly meeting locations: the WerkzeugH. Its main goal is to help attendees understand the current state of art in information technology and security, and showcase projects evolved from the hackerspace movement.
This year's tagline: Make A Good Hack After last year's tagline, 'The Internet is a Series of Tubes', PlumberCon 10 will take our approach towards security, hacking and technological innovation a step further, therefore being sub-entitled 'Make A Good Hack!'.
Not only will you again have the chance to participate in workshops and the mainly security and networking-focused talks, but also get your hands on some hardware hacking, join in to various activities, or try your luck in the infamous challenge of PacketWars(tm). However much seriousness or amusement you bring into this, we'll make sure you get an overview of today's state-of-the-art technologies, insight into a bunch of the best hackers' mindsets, and learn new things!
Save the date: July 09th - 11th, 2010 The event is going to kick off with activities (including physical activity...), trainings, and an off-site biolab workshop followed by a small party on Friday, July 09th at Vienna's no. 1 hackerspace, the Metalab.
Talks & workshops will be held throughout Saturday & Sunday, July 10th & 11th respectively, also including a PacketWars game on Saturday night - making it 3 days and nights of talks, trainings, hands-on workshops, epic haXX0r battles and a little partying; the perfect combination of technology, IT security, hardware hacking, art, music, socializing and good times.
Have a talk to do with security, hacking, or making you'd like to submit? At PlumberCon 10, we are planning to have a selection of three trainings on Friday afternoon, a variety of 50-minute talks and hands-on workshops (of unlimited length) on Saturday and Sunday, as well as 10-minute lightning talks (Sunday only).
Topics of interest include (but are in no way limited to) the following:
* Information technology
* Wireless network security
* Web application security assessment
* Virtualization and cloud computing
* Innovative attack strategies
* Honeypots
* Forensics
* Embedded devices
* Physical security and lockpicking
* Biometrics
* Hardware hacking
* Working with microcontrollers
* Phone phreaking
* Food- and Biohacking
* Open source software
* Evolutionary computing
* Robotics
To apply, shoot us an e-mail to cfp (at) plumbercon.org with your complete talk proposal and contact info!
Please include the following information in your submission:
* contact details (name & e-mail address)
* a brief bio (including qualifications, speaking experience, and affiliations)
* the title of your talk
* short intro & abstract (& any supporting materials, if available)
* the talk format you are submitting for (talk/panel/lightning talk/ demo/training/workshop)
Important Dates If you are thinking of participating and sending in a submission, please let us know NO LATER than April 25th.
Absolute deadline for submission of abstracts is the 16th of May, 2010 - all proposals submitted before this date will be considered.
Final notification of acceptence: May 24th;
final material submission (including slides and whitepapers) for accepted presentations: June 27th, 2010.
Sponsoring PlumberCon is a non-profit event and thankful for every helping hand it's given.
If you want to support the initiative and gain visibility by sponsoring, please contact us by writing an e-mail to sponsor (at) plumbercon.org
More details about PlumberCon and the CFP can be found at http://plumbercon.org
Disclaimer PlumberCon has full permission to record any material that is presented at the conference and make it available to the public under a Creative Commons license.
Unfortunately, PlumberCon will not be able to cover travel expenses. However, if you're coming in from out of state and are looking for a place to stay during the conference weekend, feel free to get in touch.
P.S.: Our apologies in case you received this message multiple times through different channels.
Hack on, /astera

Spencer Pratt uses cyber crime fighting tale to hide truth that he's taking anger management classes

Posted:

InfoSec News: Spencer Pratt uses cyber crime fighting tale to hide truth that he's taking anger management classes: http://www.nydailynews.com/gossip/2010/03/16/2010-03-16_spencer_pratt_uses_cyber_crime_fighting_tale_to_hide_truth_that_hes_taking_anger.html
By Cristina Everett Daily News Staff Writer March 16th 2010
Spencer Pratt recently announced he was leaving "The Hills" to pursue [...]

MOD website still under intense attack

Posted:

InfoSec News: MOD website still under intense attack: http://www.chinadaily.com.cn/china/2010-03/16/content_9599708.htm
Xinhua 2010-03-16
BEIJING - A chief editor with the official website of China's Ministry of National Defense (MOD), www.mod.gov.cn, said Tuesday the site still receives thousands of overseas-based hacking attacks everyday after more than six months of trial operations.
"Although the number of hacking attacks has declined since the first month of trial operations, we are still attacked by Internet hackers everyday," Ji Guilin, chief editor of the ministry's website, told Xinhua.
However, Mr. Ji refused to release a specific total number of hacking attacks so far or the major sources or origins of those attacks due to the sensitive nature of the issue.
But he said most of the overseas visitors to the website's Chinese pages were tracked to IP addresses registered in the U.S., Australia, Singapore, Japan and Canada. While most of the overseas visits to the English pages were tracked to the U.S., Australia and the United Kingdom.
The MOD website was unveiled in August last year, an effort, in many analysts' views, by the Chinese government and the 2.3-million-strong People's Liberation Army (PLA) to increase military transparency.
Ji said the website experienced more than 2.3 million attacks by hackers within its first month of operation, most of which attempted to penetrate the site's computer systems and change its homepage.
The website's claims of Internet hacking attacks echoed a military official's comment last month on allegations of the Chinese government's involvement into cyber attacks on foreign companies.
Defense Ministry spokesman Huang Xueping said Chinese networks, especially the military information network, had been a major target for Internet hackers.
The uniformed officer's remark came after former U.S. intelligence officials said the Chinese military was recruiting Internet hackers to break into U.S. government and company computer networks.
Prof. Tan Kaijia, of the PLA's National Defense University, told Xinhua that Chinese military facilities had been targeted by hackers who tried all means to tap into their Internet-wired computers.
Although the PLA's internal computer network is physically isolated from other networks, new technical tools have allowed spies to wirelessly sneak into an electronic device or facility.
"Technically speaking, there is always the possibility of hacking a network from thousands of miles away if it is connected to the Internet, whether or not it has a firewall," Senior Colonel Tan said.
"The alleged Chinese military-backed hacking of US sites proves that they did not understand the PLA's functions and missions," said Tan, who specializes in military equipment and logistics.
Tan revealed that so far the PLA has not constituted a cyber warfare unit, saying the allegation was mystifying and merely an excuse for the U.S. to strengthen cyber warfare technologies.
"Scenarios of different versions of Chinese hacking have not been rare, since the US is developing its own cyber warfare powers and overestimated the abilities of Chinese Internet users," he said.
Last year, accusations of Chinese hacking into the U.S. Department of Defense network emerged in the U.S. media just before the Pentagon announced the establishment of the new U.S. Cyber Command, which is subordinated to the U.S. Strategic Command and responsible for coordinating computer-network defense and cyber-attack operation.
"The PLA has academic researchers on information warfare, but is not capable of conducting actual cyber-attack operations. Chinese laws prohibit any forms of cyber-attack.
"Nor is the PLA allowed to hire civilian hackers, and hacking foreign government and company networks has nothing to do with the PLA's missions." Tan said.
Civilian networks in China seemed much more vulnerable to hackers. As a result, the Ministry of Industry and Information Technology Monday issued a nationwide plan to safeguard the security of domain name systems for government websites and vital networks amid surging Internet security threats and risks.
Last week, police in central China's Hubei Province destroyed the country's biggest hacker training organization and arrested three people who were suspected of running the Black Hawk Safety Network.
The network was suspected of offering online hacker tools, a crime that was listed in China's Criminal Law last year.
Statistics from the National Computer Network Emergency Response Technical Team/Coordination Center (CNCERT/CC) reveal about 262,000 Chinese computers were hijacked by Trojan programs tracked to overseas IP addresses in 2009. The top source of the programs, 16.61 percent, were computers based in the United States.
The number of Chinese computers controlled by botnets in 2009 was 837,000. A total of 19,000 overseas-hosted addresses, of which, 22.34 percent were from the U.S., participated in controlling the Chinese computers.

SEC: Hacker Manipulated Stock Prices

Posted:

InfoSec News: SEC: Hacker Manipulated Stock Prices: http://www.wired.com/threatlevel/2010/03/manipulated-stock-prices/
By David Kravets Threat Level Wired.com March 16, 2010
U.S. regulators are moving to freeze the assets and trading accounts of a Russian accused of hacking into personal online portfolios and [...]

'Operation Aurora' Changing The Role Of The CISO

Posted:

InfoSec News: 'Operation Aurora' Changing The Role Of The CISO: http://www.darkreading.com/database_security/security/attacks/showArticle.jhtml?articleID=223900131
By Kelly Jackson Higgins DarkReading March 16, 2010
The Operation Aurora attacks that hit Google, Adobe, Intel, and other U.S. companies was not only a wake-up call for businesses in denial [...]

Broadband plan would make FCC a player in cybersecurity framework

Posted:

InfoSec News: Broadband plan would make FCC a player in cybersecurity framework: http://fcw.com/articles/2010/03/16/broadband-plan-fcc-cybersecurity.aspx
By William Jackson FCW.com March 16, 2010
Under the National Broadband Plan released today by the Federal Communications Commission, the FCC would assume new responsibilities for [...]

Security experts warn firms of the higher risks of lower-risk flaws

Posted:

InfoSec News: Security experts warn firms of the higher risks of lower-risk flaws: http://www.v3.co.uk/computing/news/2259522/security-experts-warns-firms
By Dave Bailey Computing 16 March 2010
Medium- and lower-risk flaws are being used more by hackers to penetrate enterprise networks, due to firms taking longer to patch them. [...]

0 comments:

Post a Comment