The CFP is open and a new conference rushes forward. The
shorter version: Package up your PII/contact info that we
need so we can book flights and figure out visas, put
together a summary of who you are and what you want to
talk about that is cool new security research, and email
EUSecWest 2012, Amsterdam, September 19/20, Featuring Mobile PWN2OWN
CALL FOR PAPERS - Deadline June 15 2012
AMSTERDAM, Nederland -- The seventh annual EUSecWest
applied technical security conference - where the eminent
figures in the international security industry get
together share
So after a dozen years or so organizing conferences, you
get the urge to pull levers and try experimenting with
things. So this year I sent out the CanSecWest CFP
only over Twitter, and G+ publicly. Just curious as to the
adoption and information dispersion rate, and some
estimate of the
PacSec CALL FOR PAPERS
TOKYO, Japan -- To address the increasing importance of information security
in Japan, the best known figures in the international security industry will
get together with leading Japanese researchers to share best practices and
technology. The most significant new
First they ignore you, then they ridicule you,
then they fight you, then you win. -- Mahatma Ghandi.
Well if Fox's new comedy show Breaking In is any
indication, infosec has now entered Ghandi's second
stage. http://goo.gl/ZpLDp [youtube] (hat tip to Adam
O'Donnell for this humorous find, and
EUSecWest 2010 MiniCFP (PacSec CFP Follows)
One of our presenters was unable to get corporate approval for his
travel and cancelled out. As such we are opening up one or two
available slots for last minute submissions. We are also offering
a referral bounty of a free conference registration for
EUSecWest CALL FOR PAPERS
AMSTERDAM, Nederland -- The sixth annual EUSecWest applied technical
security conference - where the eminent figures in the international
security industry will get together share best practices and technology
- will be held in downtown Amsterdam at the the
We extend our apologies if you are inconvenienced by multiple copies of this
messages.
We would like to announce the PacSec 2009 Paper Selections, and
the opening of the 2010 CanSecWest Call For Papers. Given
the proximity of the Winter Olympics in Vancouver one month
before the conference, we
On 11-May-09, at 7:29 AM, Juha-Matti Laurio wrote:
The oldest documented vulnerability in computer security world is
password file disclosure vulnerability from 1965, found by Mr. Ryan
Russell.
Open Security Foundation launched a competition in April to find the
oldest documented data
EUSecWest 2009 Speakers
Efficient UAK Recovery attacks against DECT
- Ralf-Philipp Weinmann, University of Luxembourg
A year in the life of an Adobe Flash security researcher
- Peleus Uhley, Adobe
Pwning your grandmother's iPhone
- Charley Miller, Independent Security
Call For Papers
The EUSecWest 2009 CFP is now open.
Deadline is April 7th, 2009.
EUSecWest CALL FOR PAPERS
LONDON, U.K. -- The third annual EUSecWest applied
technical security conference - where the eminent figures
in the international security industry will get together
Call For Papers
The CanSecWest 2009 CFP is now open.
Deadline is December 8th, 2008.
CanSecWest CALL FOR PAPERS
VANCOUVER, Canada -- The tenth annual CanSecWest applied
technical security conference - where the eminent figures
in the international security industry will get
Spanish url: http://ba-con.com.ar/speakers.html?language=es
Speaker list and Dojos for BA-Con, September 30, October 1st.
(all presentations in both Spanish and English)
Presentations:
WPA/WPA2: how long is it gonna make it - Cédric Blancher Simon Maréchal,
EADS SGDN
Security Concerns
On 22-Aug-08, at 7:41 AM, Juha-Matti Laurio wrote:
New information about the important infrastructure issue affecting
to Fedora Project has been released today.
Mr. Paul W. Frields, Fedora Project Leader has posted an
announcement about the facts, including:
One of the compromised Fedora
BA-Con 2008 CALL FOR PAPERS
BUENOS AIRES, Argentina -- The first annual BA-Con applied
technical security conference - where the eminent figures in the
international and South American security industry will get together
and share best practices and technology - will be held in
The selected papers for EUSecWest 2008 are:
* PhlashDance, discovering permanent denial of service attacks against
embedded systems - Rich Smith, HP Labs
* Attacking Near Field Communications (NFC) Mobile Phones - Collin Muliner,
trifinite
* Abusing X.509 certificate features -
(We've moved the conference this year to the a club
in Leicester Square in the heart of London and SoHo.
We'll be putting speakers up across the square at the
Radisson Edwardian Hampshire, but there are lots of
hotels in the region there in the center of London
for those who want to attend (the
CanSecWest 2008 Presentations
Snort 3.0 - Marty Roesch, Sourcefire
Cross-Site Scripting Vulnerabilities in Flash Authoring Tools - Rich
Cannings, Google
Proprietary RFID Systems - Jan starbug Krissler and Karsten Nohl, CCC
Media Frenzy: Finding Bugs in Windows Media Software - Mark Dowd and
I'd like to congratulate Adam Laurie for winning the second Powerbook
from the Pwn_to_Own contest as the prize for the best speaker rated
by the audience for his presentation on RFID at CanSecWest 2007.
We will have a similar prize for the best speaker at CanSecWest 2008,
prize TBD (but we promise
On Tuesday 06 November 2007 02:37, Roman Shirokov wrote:
Hey all
I confirm that, I received several messages as well. The text of
message is:
WINDOWS REQUIRES IMMEDIATE ATTENTION
=
ATTENTION ! Security Center has detected
malware on your computer !
Affected
With all the proliferation of phone home for update systems in
even trivial software packages these days, neophyte users
can easily get confused about legitimate upgrades and imposters.
So someone is trying to take advantage of this with an
automated version of an old school social engineering
With great sadness, I regret to inform you that Itojun
will not be presenting his great knowledge of IPv6 at
PacSec. I have been informed by several sources
that he passed away yesterday.
Funeral services will be held on Nov 7th at Rinkai-Saijo
in Tokyo. There aren't many details of his
Talk selections for PacSec 2007 - November 29 and 30 - Aoyama Diamond Hall
---
- Programmed I/O accesses: a threat to virtual machine monitors? - Loic
Duflot,
- Developing Fuzzers with Peach - Michael Eddington, Leviathan Security
- Cyber Attacks Against Japan - Hiroshi Kawaguchi, LAC
-
Some folks have been trying to convince us to extend deadlines,
so being the sticklers we are, we said: no way... But they convinced
us. So to be fair - this is a heads up for others who didn't have time
to submit. :-) We'll try to turn around the selection reviews ASAP,
before the end of August
On Tuesday 10 July 2007 08:53, Gadi Evron wrote:
To paraphrase Guninski, this is still not a 0day. It is a vulnerability
being disclosed.
You're being pedantic Gadi. :-)
We have to accept the term 0day has passed into
the realm of meaningless nebulousness along with
hacker and other misused
PacSec CALL FOR PAPERS
World Security Pros To Converge on Japan
TOKYO, Japan -- To address the increasing importance of
information security in Japan, the best known figures in the
international security industry will get together with leading
Japanese researchers to share best
Hi,
For those who asked, we are still processing the submissions for CanSecWest
and the call closed, please stand by. The paper selections are back from the
reviewers for EUSecWest, in London on March 1-2.
In absolutely random order:
Threats against and protection of Microsoft's internal
On Friday 15 December 2006 10:07, Bruno Lustosa wrote:
On 15 Dec 2006 09:49:54 -, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
try yourself with OpenOffice.org 2.1:
http://www.milw0rm.com/sploits/12122006-djtest.doc
Crashed OpenOffice.org 2.1 on my Linux system (Gentoo using
CanSecWest 2007 CALL FOR PAPERS
VANCOUVER, Canada -- The eighth annual CanSecWest applied technical security
conference - where the eminent figures in the international security industry
will get together share best practices and technology - will be held in
downtown Vancouver at the the
Hi folks, some brief news:
Some people have asked for late submissions to the EUSecWest
paper selections. In the interest of fairness, we are extending the
deadline for all until next Tuesday (November 7), at which time
the submissions will be reviewed. Details of submissions can
be found on the
==
PacSec Hype Security Team
param injection in CGI.pm and inheritors
allows SQL injection and manipulation of data
bypassing many perl web form validators
Advisory:
The new Flash player adds network functions!
Details:
With a minor amount of fanfare binary socket support has been
added to Flash Player 9 / ActionScript 3.0. The Flash sandbox model
is primarily focused on preventing modifications to the local system,
and thus there are many ways to
The PacSec 2006 paper selections have been announced:
Smashing Heap by Free Simulation - Sandip Chaudhari
Methods of increasing source code security automatically - Ben Chelf,
Coverity
IPTV: Triple Play Triple Threats - YM Chen, McAfee
Windows Vista Security Model - Matt Conover,
url: http://pacsec.jp
PacSec 2006 CALL FOR PAPERS
World Security Pros To Converge on Japan
TOKYO, Japan -- To address the increasing importance of information
security in Japan, the best known figures in the international security
industry will get together with leading Japanese
On March 23, 2006 01:41 am, Gadi Evron wrote:
Here's what ISS releasing the Race Condition vulnerability has to say:
http://xforce.iss.net/xforce/alerts/id/216
They say it's a remote code execution. They say it's a race condition. No
real data available to speak of. I can't see how it's
The call for papers is now closed and the proposals have been reviewed
for the CanSecWest/core06 Applied Technical Security Conference held
on April 5-7 2006 at the Mariott Renaissance Harbourside in Vancouver,
B.C. Canada.
The selected submissions are :
An hour of Rap and Comedy about SAP -
url: http://eusecwest.com
url: http://cansecwest.com
(CanSecWest Call For Papers attached below)
EUSecWest/core06 Conference
---
Announcing the final selection of papers for the
EUSecWest conference in London, U.K. on Feb. 20/21
at the Victoria Park Plaza Hotel. The
url: http://eusecwest.com
url: http://pacsec.jp
(PacSec/Tokyo Announcement below...)
EUSecWest/core06 CALL FOR PAPERS
London Security Summit February 20/21 2006
LONDON, United Kingdom -- Applied technical security
will be the focus of a new annual conference
On April 3, 2003 08:24 am, dong-h0un U wrote:
Hello.
Exploit confirmed possible truth in OpenBSD.
But, I did not exploit.
Also, did not test in RedHat 8.0.
...
/*
**
** [*] Title: Remote Multiple Buffer Overflow vulnerability in passlogd
sniffer. ** [+] Exploit code:
CALL FOR PAPERS: CanSecWest/core03
The fourth annual CanSecWest computer security training
conference is scheduled to be held April 16-18 2003 in
Vancouver, British Columbia, Canada.
Submissions and presentation proposals for tutorials
for this conference will be accepted during the months
Just a quick follow-up to the fragroute alarmism (which I see has
prompted Mr. James Middleton at vnunet to write a news story
Evasion tool put's Snort's nose out of joint :-). First, this
is not a snort-only issue, as I would wager other idses have as
many if not more evasion modes as well as
Heh, well... first... don't panic. :-)
First of all I would like to commend Dug on his responsible disclosure stance.
He has given the IDS vendors several months heads up that this stuff is in the
pipe... I think everyone who needed to know knew this was coming down the pipe,
so this is in
url: http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html
Be careful with your wireless networks.
cheers,
--dr
--
Dragos Ruiu [EMAIL PROTECTED] dursec.com ltd. / kyx.net - we're from the future
gpg/pgp key on file at wwwkeys.pgp.net or at http://dursec.com/drkey.asc
CanSecWest/core01: March
ou to seek management approval for entry into this forum, and
then either contact, or have a responsible party contact, [EMAIL PROTECTED]
Paul Vixie
Chairman
ISC
--
Dragos Ruiu [EMAIL PROTECTED] dursec.com ltd. / kyx.net - we're from the future
gpg/pgp key on file at wwwkeys.p
and have it work. Call it the data motel
security model and approach... :-)
cheers,
--dr
On Tue, 15 Feb 2000, Andrzej Bialecki wrote:
On Sat, 12 Feb 2000, Dragos Ruiu wrote:
How to use it:
-This patch makes the kernel log all ethernet packets to syslog.
-The logging happens at the default
One of the problems that people have is logging the origin of the attack
streams and tracing packet paths through the networks. Here is a small bit of
code that may help you inexpensively deploy some packet loggers at key
network ingress/egress points. The real solution is to get Dragon or NFR or
Panic Button, open trouble notification channel: Attack Defender
The appropriate place to suggest this solution was at the NANOG meeting
on DDOS but I didn't think of it before then so I thought that a posting
to bugtraq may float this proposal for public discussion. The term ISP
is used below
47 matches
Mail list logo