DEFCON TORONTO #4 Covering everything you need to know about the latest cyber attacks, zero days, data leaks, vulnerabilities and hacker lulz Presenter:

Slides:



Advertisements
Similar presentations
Question 1 Did you get root? We got the kernel, and from the kernel we got root. This is an often asked question and is actually the worst question we.
Advertisements

Update your Software or Die! Wolfgang Kandek Qualys, Inc. RMISC 2012 Denver - May 18, 2012.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
7 Effective Habits when using the Internet Philip O’Kane 1.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Windows 7 Project and Heartbleed Update Sian Shumway Director, IT Customer Service.
Cyber Metrics in the DoD or How Do We Know What We Don’t Know? John S. Bay, Ph.D. Executive Director.
A Complete Tool For System Penetration Testing Presented By:- Mahesh Kumar Sharma B.Tech IV Year Computer Science Roll No. :- CS09047.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Previous Gnews. 13 Patches – 8 Critical, Affects pretty much everything Other updates, MSRT, Defender Definitions, Junk Mail Filter –MS SMBv2.
Previous Gnews. 5 Patches – x bugs addressed Other updates, MSRT, Defender Definitions, Junk Mail Filter 5 Security Patches - 5 Critical –MS – JScript.
PREVIOUS GNEWS A Hacker is You!. 1 Patches – 1 bugs addressed Affecting Windows (pretty much all of them) Other updates, MSRT, Defender Definitions, Junk.
By Creighton Linza for IT IS Introduction  Search Engine  an information retrieval system that searches its database for matches based on a query.
15 years of Web Security © 2015 WhiteHat Security, Inc. Jeremiah Grossman Founder WhiteHat Security, Inc. The Rebellious Teenage Years.
Smart City Hacked??? Technology & Society. American cities vulnerable to large-scale cyber attack
ShapeShifter Jennifer Nguyen, Jordan Travis, Cian Connor, Rebecca Miller.
Methods of Secure Information System Design
Taking on Tomorrow's Challenges Today Taking on Tomorrow's Challenges Today Almost every organisation has been attacked …. But most don’t know about it!
Open Source Security Updates Why it's Different; What you Should Know Josh Bressers Friday, 11 May 2007.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
WannaCry/WannaCrypt Ransomware
Ted Allen Rotary May 17, 2017 WannaCry Ransomware Ted Allen Rotary May 17, 2017.
Industrial Control System Cybersecurity
WannaCry/WannaCrypt Ransomware
International Conflict & Cyber Security
IBM 2016 Cyber Security Intelligence Index
Ethical Hacking By: Erin Noonan.
Portal User Group Meeting
THE RISKS OF ‘NOT’ PATCHING…
Computer Network Security
Real-time protection for web sites and web apps against ATTACKS
Secure Software Confidentiality Integrity Data Security Authentication
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.
E-commerce Application Security
2014: the year so far in cyber security
Common Operating System Exploits
Yahoo Zero-Day Vulnerability - Code Point of View
Cyber Security & Embedded Systems Training Bootcamp VISIT TONEX.COM.
Myths About Web Application Security That You Need To Ignore.
Security Threats Haunting the E-Commerce Industry. How Can Security Testing Help?
5G Security Training
Mcafee updates Mcafee antivirus uses a database of known virus definitions to identify malware and other threats on your computer system. So it is important.
Facebook Support Number | Solve All Problems
Nessus Vulnerability Scanning
Internet Worm propagation
Malware March 26, 2018.
Cyber Security and the National Broadband Strategy
Brute force attacks, DDOS, Botnet, Exploit, SQL injection
Data security in iot devices
Lecture 2 - SQL Injection
Junior/Senior Parent Night Tuesday, September 11, 2018 RPHS
Luxury Images copyrighted to:
Olympia Retreat Events Corporate Packages
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Vulnerability Reporting Process
Test 3 review FTP & Cybersecurity
OWASP Joomla! (CMS) Vulnerability Scanner Project Flyer
Marcial Quinones-Cardona
Botnets and Remote Administration Tools
CEHv8 v Engineered by Hackers. Presented by Professionals.
Threat Landscape Update
Secure your high performance code
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

DEFCON TORONTO #4 Covering everything you need to know about the latest cyber attacks, zero days, data leaks, vulnerabilities and hacker lulz Presenter: Nick Aleks | nick@dc416.com

WHY? Target Audience Both mentor and mentee benefits Network expansion Mentorship WHY? Target Audience Both mentor and mentee benefits Network expansion How? Educational and professional Your feedback is required Presenter: Nick Aleks | nick@dc416.com

Latest Cyber News Covering everything you need to know about the latest cyber attacks, zero days, data leaks, vulnerabilities and hacker lulz Presenter: Nick Aleks | nick@dc416.com

Oct 25th Joomla CMS – Critical Update! 3.6.4 v3.4.4 - v3.6.3 Have two core flaws. Account Creation Vulnerability: Allows any user to register on a website, even if registration is disabled Elevated Privileges Flaw: Allows used to perform advanced functions ordinary users are not authorized for

Joomla CMS – Critical Update! 3.6.4 To learn more: https://medium.com/@showthread/joomla-3-6-4-account-creation-elevated-privileges-write-up-and-exploit-965d8fb46fa2#.2nubo05bn To detect what’s running on your friends website to help them fix it!

Oct 26th Adobe Patches Flash Zero Day Under Attack! v. 23.0.205 One of the Heartbleed finders discovered a use-after-free vulnerability. Use-after-free bugs are memory corruption issues that expose systems to code execution. Keep up the emergency zero day patching flash! April, May, June and now Oct.

NEXT

Oct 24th Hacking Drones! Planned Obsolescence In a new demo, researchers showed how a $1,000 3D quadcopter UAV drone can be hacked and doomed to die before it ever even lifts off. How you might ask?

dr0wned Hacking Drones! Planned Obsolescence https://www.youtube.com/watch?v=zUnSpT6jSys

NEXT

Starbucks Black Card Hacking Oct 25th Free Coffee? 365 days, make it your birthday on each one.

Demo Starbucks Black Card Hacking https://www.youtube.com/watch?v=j-amMp84i1g

NEXT

Hacker selling IoT Botnet Oct 25th Last Friday was a huge setback for various services including Twitter, Paypal, Github, Reddit etc. Nevertheless in our industry, one mans shitty day usually means another mans pay day. A hacker group has been started to sell IoT botnets with 180,000 bots with a 1Tbps DDoS capability Prices have been seen around: $4600 – 50,000 bots $7500 – 100,000 bots

END