Ruxcon 2010 Call For Papers

Ruxcon 2010 Call For Papers


Ruxcon 2010 Call For Papers

Posted:

InfoSec News: Ruxcon 2010 Call For Papers: Forwarded from: cfp (at) ruxcon.org.au
RUXCON 2010 CALL FOR PAPERS
Ruxcon would like to announce the call for papers for the sixth annual Ruxcon conference.
This year the conference will take place over the weekend of 4th and 5th of December.
Ruxcon will be held at the Royal Melbourne Institute of Technology (RMIT), Melbourne, Australia.
The deadline for submissions is the 30th of July.
* What is Ruxcon?
Ruxcon is the premiere technical computer security conference within Australia. Ruxcon aspires to bring together the individual talents of the best and the brightest security folk within the Aus-Pacific region, through live presentations, activities, and demonstrations.
Ruxcon's unique approach to running a security conference ensures that the conference is accessible to all levels of the security industry. Ruxcon aims to be the most interesting, thought-provoking, and relevant information security conference in Australia.
The conference is held over two days in a relaxed atmosphere, allowing attendees to enjoy themselves whilst networking within the community and expanding their knowledge of security.
Live presentations and activities will cover a full range of defensive and offensive security topics, varying from previously unpublished research to required reading for the security community.
For more information, please visit http://www.ruxcon.org.au
* Presentation Information
Presentations are set to run for 50 minutes, and will be of a formal nature, with slides and a speech.
* Presentation Submissions
Ruxcon would like to invite people who are interested in security to submit a presentation.
Topics of interest include, but are not limited to:
o Mobile Device Security o Virtualization, Hypervisor, and Cloud Security o Malware Analysis o Reverse Engineering o Exploitation Techniques o Rootkit Development o Code Analysis o Forensics and Anti-Forensics o Embedded Device Security o Web Application Security o Network Traffic Analysis o Wireless Network Security o Cryptography and Cryptanalysis o Social Engineering o Law Enforcement Activities o Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc)
Submissions should thoroughly outline your desired presentation subject. Accompanying your submission should be the slides you intend to use or a detailed paper explaining your subject.
If you have any enquiries about submissions, or would like to make a submission, please send an e-mail to presentations () ruxcon org au
The deadline for submissions is the 30th of July.
If approved we will additionally require:
i. A brief personal biography (between 2-5 paragraphs in length). ii. A description on your presentation (between 2-5 paragraphs in length).
* Contact Details
Presentation Submissions: presentations () ruxcon org au

Private patient information stolen from Northwestern used in massive identity theft

Posted:

InfoSec News: Private patient information stolen from Northwestern used in massive identity theft: http://www.suntimes.com/news/24-7/2123042,identity-theft-ring-bust-women-032510.article
By Kara Spak Staff Reporter Suntimes.com March 25, 2010
Unlocked file cabinets of patient information on three floors of Northwestern Memorial Hospital.
Customers who didn't check their credit card statements.
All created a ripe environment for a small crew of bandits to steal hundreds of identities then spend more than $300,000 on items charged from stores like Jared the Galleria of Jewelry, Victoria's Secret and Lowe's, Cook County Sheriff Tom Dart said Thursday.
Some of the ill-gotten purchases were resold for cash, Dart said.
Others were posted on Facebook, the perpetrators preening in new jewelry and clothing, he said.
[...]

TJX Hacker Gets 20 Years in Prison

Posted:

InfoSec News: TJX Hacker Gets 20 Years in Prison: http://www.wired.com/threatlevel/2010/03/tjx-sentencing/
By Kim Zetter Threat Level Wired.com March 25, 2010
BOSTON -- Convicted TJX hacker Albert Gonzalez was sentenced to 20 years in prison on Thursday for leading a gang of cyberthieves who stole more [...]

Former student pleads guilty to hacking school payroll data

Posted:

InfoSec News: Former student pleads guilty to hacking school payroll data: http://www.columbian.com/news/2010/mar/25/former-student-pleads-guilty-to-hacking-school-pay/
By Howard Buck Columbian staff writer The Columbian March 25, 2010
A 21-year-old former Evergreen Public Schools student has pleaded guilty to criminal charges in connection with a computerized payroll security breach last November that put more than 5,000 past and current Vancouver district school employees at risk of identity theft.
Christopher Berge, last known to reside in Oregon City, Ore., was sentenced to 10 years in prison on Wednesday by Clark County Superior Court Judge Roger Bennett.
Berge pleaded guilty to counts of first-degree computer trespass; second-degree identity theft; forgery; and possession of methamphetamine.
The news was announced late Wednesday by e-mail from Vancouver Superintendent Steve Webb to district administrators, and passed to other employees today. Webb wrote that the pleas brought "closure" to the data breach uncovered last Nov. 9.
Webb's e-mail said Berge had "shoulder-surfed" a password from an Evergreen school employee while still a student there.
[...]

U.S. Faces Cyber Security Gap Without Training, Education

Posted:

InfoSec News: U.S. Faces Cyber Security Gap Without Training, Education: http://www.esecurityplanet.com/features/article.php/3872626/US-Faces-Cyber-Security-Gap-Without-Training-Education.htm
By Kenneth Corbin eSecurity Planet March 24, 2010
WASHINGTON -- As discussions about the federal approach to cyber security continue to percolate across the highest levels of government, one of the most important steps policymakers can take is to nourish the education and training of a new crop of security experts, a senior administration official said here at the FOSE government IT show.
Working in concert with the government, the private sector has made significant strides in improving software security and ferreting out vulnerabilities in the supply chain, but the flow of cyber security experts graduating from the nation's universities with advanced degrees remains anemic, according to Richard Marshall, the director of global cyber security management at the Department of Homeland Security.
"No matter how successful we are in those two elements, we are going to fail if we don't invest more money, time, attention and rewards to educate the workforce," Marshall said. "That's our legacy-to-be."
DHS and the National Security Agency (NSA) jointly sponsor the Centers for Academic Excellence, a consortium of universities that focus on advanced information security education. While participation in the program has snowballed, federal funding for scholarships has not kept pace.
[...]

Secunia Weekly Summary - Issue: 2010-12

Posted:

InfoSec News: Secunia Weekly Summary - Issue: 2010-12: ========================================================================
The Secunia Weekly Advisory Summary 2010-03-18 - 2010-03-25
This week: 65 advisories [...]

Is cybersecurity underfunded? Many feds think so

Posted:

InfoSec News: Is cybersecurity underfunded? Many feds think so: http://gcn.com/articles/2010/03/25/fose-cdw-security-survey.aspx
By Kathleen Hickey GCN.com March 25, 2010
Ninety-four percent of government and related information technology professionals believe federal agencies and networks get attacked every [...]

THOTCON - Chicago's Hacking Conference - Registration

Posted:

InfoSec News: THOTCON - Chicago's Hacking Conference - Registration: http://tickets.thotcon.org/
**************************************** ***BEGIN THOTCON TRANSMISSION***********
THOTCON (pronounced \ˈthȯt\ and taken fr om THree - One - Two) is a new small ven ue hacking conference based in Chicago I L, USA. This is a non-profit, non-commer [...]

iPhone, Safari, IE8, Firefox all fall on day one of Pwn2Own

Posted:

InfoSec News: iPhone, Safari, IE8, Firefox all fall on day one of Pwn2Own: http://www.computerworld.com/s/article/9174078/iPhone_Safari_IE8_Firefox_all_fall_on_day_one_of_Pwn2Own?taxonomyId=17
By Gregg Keizer Computerworld March 24, 2010
Hackers took down Apple's iPhone and Safari browser, Microsoft's Internet Explore 8 (IE8) and Mozilla's Firefox within minutes at today's Pwn2Own contest, as expected.
The two-man team of Vincenzo Iozzo and Ralf-Philipp Weinmann exploited the iPhone in under five minutes, said a spokeswoman for 3Com TippingPoint, the security company that sponsored the contest. The pair also walked away with $15,000 in cash, a record prize for the challenge, which is in its fourth year.
Iozzo, an Italian college student, works for Zynamics GmbH, the company headed by noted researcher Thomas Dullien, better known as Halvar Flake, while Weinmann is a post-doctoral researcher at the Laboratory of Algorithms, Cryptology and Security at the University of Luxembourg.
Weinmann is probably best known for being part of a three-man team that in 2007 demonstrated how to crack the Wi-Fi security protocol WEP much faster than previously thought possible.
[...]

Law Enforcement Appliance Subverts SSL

Posted:

InfoSec News: Law Enforcement Appliance Subverts SSL: http://www.wired.com/threatlevel/2010/03/packet-forensics/
By Ryan Singel Threat Level Wired.com March 24, 2010
That little lock on your browser window indicating you are communicating securely with your bank or e-mail account may not always mean what you think its means. [...]

Cyber Attacks Reported By 100% Of Executives

Posted:

InfoSec News: Cyber Attacks Reported By 100% Of Executives: http://www.informationweek.com/news/security/attacks/showArticle.jhtml?articleID=224200279
By Thomas Claburn InformationWeek March 24, 2010 06:05 PM
Seventy-seven percent of C-level executives in a 115-person survey conducted in the U.K. say their organization has experienced a data [...]

Cloud computing is not always helpful in data recovery

Posted:

InfoSec News: Cloud computing is not always helpful in data recovery: http://fcw.com/articles/2010/03/24/fose-cloud-computing-not-always-helpful-in-data-recovery.aspx
By Alice Lipowicz FCW.com March 24, 2010
Newer technologies such as cloud computing can be a boon for post-disaster recovery of data, but they don't always help much, Dennis [...]

Obama Twitter account 'hacked by Frenchman'

Posted:

InfoSec News: Obama Twitter account 'hacked by Frenchman': http://news.bbc.co.uk/2/hi/europe/8586269.stm
BBC News 24 March 2010
A Frenchman who police say hacked Twitter accounts belonging to US President Barack Obama and celebrities could face jail.
The unemployed 25-year-old was arrested on Tuesday after an operation [...]

Canada easy prey for cyber attacker: expert

Posted:

InfoSec News: Canada easy prey for cyber attacker: expert: http://www.ottawacitizen.com/technology/Canada+easy+prey+cyber+attacker+expert/2718450/story.html
By Vito Pilieci The Ottawa Citizen March 24, 2010
OTTAWA - Canada is woefully unprepared for a massive cyber-attack that is within the capabilities of any run-of-the-mill hacker, and which [...]

0 comments:

Post a Comment