Cyber crime experts reveal emerging security threats

May 2010 News

World-renowned specialists, researchers and authors, tackle the new information security landscape at ITWeb’s 5th annual Security Summit.

They have challenged convention, caused controversy and outwitted some of the sharpest criminal minds and sophisticated computer programs in existence – cyber crime specialists Dr Charlie Miller, Moxie Marlinspike and Felix ‘FX’ Lindner, will lead the speaker panel at ITWeb Security Summit, from 11–13 May at the Sandton Convention Centre.

Dr Charlie Miller, principal software security analyst at Independent Security Evaluators, will demonstrate smartphone attacks that have been successful in the past, as well as make some “wild speculations about the future of smartphone security”.

A computer security researcher who spent five years working for the National Security Agency, Miller is known for publicly demonstrating his hacks on products manufactured by Apple, including the iPhone and the MacBook Air.

Moxie Marlinspike, independent computer security researcher, will examine modern threats to privacy. The author of published research on secure protocols and creator of sslsniff and sslstrip tools, Marlinspike says, “A lot has changed since discussions around digital privacy began.

“Rather than a centralised state-backed database of all our movements, modern threats to privacy have become something much more subtle, and perhaps all the more sinister.” His talk will explore these evolving trends and discuss some interesting solutions in the works.

Felix ‘FX’ Lindner, owner of Recurity Labs, computer and network security consultant, will highlight the gap between security theory and practice for securing communications infrastructure. “In theory, theory and practice are the same. In practice, they are not. By using just a couple of simple key points, we can have the entire Internet as a secure and safe global network, or so it often seems.”

Lindner co-authored The Shellcoder’s Handbook, which describes how to find security holes in any operating system or application.

Other international security experts who will address the 2010 Security Summit include:

* Nitesh Dhanjani, who will discuss the security risks of social networking.

* Joe Grand, who will give an historical perspective on the L0pht: a hacker think tank, which famously testified before the Congress of the US that they could shut down the Internet in 30 minutes.

* Jeremiah Grossman who will reveal the top web hacking techniques from 2009.

* Saumi Shah who will explain exactly what is needed to provide web application security.

* Dino Dai Zovi who will discuss practical return-oriented programming.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Prevention-first approach to cybersecurity
News Cyber Security
Check Point CEO, Gil Shwed, highlights the increasing importance of artificial intelligence in defending evolving networks and protecting against cyber threats at annual CPX 360 customer and partner event.

Read more...
Three new portable power stations to ease load shedding
News Security Services & Risk Management Products
EcoFlow has launched three portable power stations that provide sufficient power for consumers wherever they are; the DELTA 2 and RIVER 2 Series are feature-filled power solutions to the volatile electricity supply.

Read more...
UJ and Schneider Electric launch 4IR Experience Room
News
Schneider Electric and the University of Johannesburg (UJ) Faculty of Engineering and Built Environment (FEBE) have officially unveiled the 4IR Experience Room, a first for UJ and situated at the university’s Auckland Park Campus.

Read more...
SafeCity Guarding rolls out across 14 suburbs in Johannesburg
News Security Services & Risk Management
In a major drive to provide communities across Johannesburg with additional safety, Vumacam, in partnership with Fidelity ADT and other security providers across the region, rolled out the innovative SafeCity Guarding initiative in 14 suburbs.

Read more...
Providing an interactive branding platform
Securex South Africa News Conferences & Events
Now in its 30th year of providing security technology and services providers with a platform for increasing their brand exposure, Securex South Africa will be held at the Gallagher Convention Centre in Midrand, from the 6th to 8th June 2023.

Read more...
ALX sponsored learning programmes for 2023
Training & Education News
With a mission to harness Africa's abundant human capital by developing two million ethical and entrepreneurial young leaders from the continent by 2030, ALX has launched four fully sponsored (at no cost) tech programmes for 2023.

Read more...
LockBit ransomware gang most apt to leak stolen victim data
News
Trellix has released The Threat Report: February 2023 from its Advanced Research Centre, combining telemetry collected from the world’s largest network of endpoint protection installs and its complete XDR product line with data gathered from open- and closed-source intelligence reports.

Read more...
Schneider Electric is looking for your bold idea
News
Schneider Electric has launched this year’s Schneider Go Green, an annual competition that invites university students from across the globe to share their ideas for innovations that can help make the world cleaner, more inclusive, and more sustainable.

Read more...
Keeping students, staff and communities safe
Vumacam News CCTV, Surveillance & Remote Monitoring Security Services & Risk Management
South African schools are facing increasing security challenges, making effective surveillance systems more important than ever. To address this issue, Vumacam is offering advanced security solutions with security partners, aimed at keeping students, staff, and the community safe.

Read more...
Arcules and IMMIX announce integration
News CCTV, Surveillance & Remote Monitoring Products
Arcules has announced that its integration with Immix Central Station and Guard Force is available. The integration provides Central Station and Guard Force users a way to manage, verify, and respond to security events, while using Arcules-managed video feeds.

Read more...