Feeds

Blackjacking and RFID passport exploits star at DEF CON

Via Las Vegas

Securing Web Applications Made Simple and Scalable

All eyes in the information security world will be on Las Vegas this week as the desert city plays host to Def CON 14 and the Black Hat briefings.

Last year's DEF CON will be most remembered for the controversy over the presentation on security vulnerabilities in Cisco's networking kit by security researcher Michael Lynn.

This year's event promises to be just as interesting. "Johnny Cache" is down to talk about wireless LAN device driver exploits. The attack creates a means to seize control of a target computer even if someone is not connected to a wireless network at the time.

Lukas Grunwald will give a practical demonstration on hacking new RFID Technologies used for dual-interfaces cards, such as within credit cards and passports.

Another scheduled talk that caught our eye was one on hacking into enterprise networks via a Blackberry, appropriately entitled Blackjacking.

These talks, and many more, will take place at the Riviera Hotel, Las Vegas from 4-6 August.

But before DEF CON, the world's largest annual hacker convention, comes the Black Hat Briefings, its more respectable security sibling where hackers traditionally rub shoulders with technology executives and Feds.

A few topics at Black Hat caught our eye including: a presentation by SPI Dynamics on using RSS feeds to deliver exploits; an attack on VoIP security FUD, entitled Hacking VoIP Exposed; and the intriguingly titled Subverting Vista Kernel For Fun And Profit.

Black Hat takes place at Caesars Palace on Wednesday and Thursday this week. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.