Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

9/19/2013
04:41 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Black Hat To Launch First Regional Summit In Brazil

Two-day event will be co-located with IT Forum Expo

SAN FRANCISCO, Sept. 19, 2013 /PRNewswire/ -- Today, Black Hat, the world's leading family of information security events, announced the Black Hat Regional Summit to take place in Brazil this November. This two-day event will be co-located with IT Forum Expo, providing attendees with two parallel tracks of high intensity content on the latest security research, trends and industry challenges. Both events will take place November 26 – 27, 2013, at the Transamerica Expo Center in Sao Paulo, Brazil. For more information and to register, please visit: https://www.blackhat.com/sp-13/

The Black Hat Regional Summit in Sao Paulo will introduce a mix of local in-region experts and researchers from around the globe for two full days of Briefings and Workshops. The sessions will provide candid insight and education for IT security professionals and enthusiasts of all levels. Some of the highlights of the upcoming Black Hat Regional Summit include:

Carna Botnet: Telnet's Threat to the World (and Brazil): Parth Shukla of the Australian Computer Emergency Response Team (AusCERT) will offer attendees an exclusive look into how the first-ever internet census was conducted, the devices that were compromised for the Carna Botnet, and analysis of the data that was gathered - never before shared publically.

Defeating WhatsApp's Lack of Privacy: Jaime Sanchez will present a novel way to add a new layer of security and privacy to the popular chat app, WhatsApp. By anonymizing and encrypting conversations, no one will transmit data to the app directly, keeping your conversations truly off the record.

A Practical Attack Against MDM Solutions: Ohad Bobrov will expose how mobile cyber-espionage attacks are carried out through a novel proof-of-concept attack that bypasses traditional defenses including Mobile Device Management (MDM) features such as encryption.

"I couldn't be more thrilled to see Black Hat in Brazil – a place unlike anywhere else on Earth," explained Trey Ford, General Manager, Black Hat. "Their vibrant community and expanding technology market make it an ideal location for a Regional Summit."

For more information and to review the full list of sessions to be presented at the Black Hat Regional Summit, please visit: http://www.blackhat.com/sp-13/. Delegates registering for the Black Hat Regional Summit will also have full access to the IT Forum Expo. Registration for both events is managed through the IT Forum Expo site and can be completed here.

Future Black Hat Dates and Events

>> Black Hat Regional Summit, Sao Paulo, Brazil, November 26-27, 2013

>> Black Hat Trainings, Seattle, Washington, December 9-12, 2013

>> Black Hat Asia 2014, Singapore, March 25-28, 2014

>> Black Hat USA 2014, Las Vegas, Nevada, August 2-7, 2014

>> Black Hat Europe 2014, Amsterdam, The Netherlands, October 14-17, 2014

Connect with Black Hat

Twitter: https://twitter.com/BlackHatEvents - hashtag #BlackHat

Facebook: http://www.facebook.com/blackhat

LinkedIn Group: http://www.linkedin.com/groups?home=&gid=37658

Flickr: http://www.flickr.com/photos/blackhatevents/

About Black Hat

For more than 16 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global events and trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors. Black Hat Briefings and Trainings are held annually in the United States, Europe and Asia, and are produced by UBM Tech. More information is available at: http://www.blackhat.com.

About UBM Tech

UBM Tech is a global media business that brings together the world's technology industry through live events and online properties. Its community-focused media and events provide expertly curated content along with user-generated content and peer-to-peer engagement opportunities through its proprietary, award-winning DeusM community platform. UBM Tech's brands include EE Times, Interop, Black Hat, InformationWeek, Game Developer Conference, CRN, and DesignCon. The company's products include research, education, training, and data services that accelerate decision making for technology buyers. UBM Tech also offers a full range of marketing services based on its content and technology market expertise, including custom events, content marketing solutions, community development and demand generation programs. UBM Tech is a part of UBM (UBM.L), a global provider of media and information services with a market capitalization of more than $2.5 billion.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-26250
PUBLISHED: 2020-12-01
OAuthenticator is an OAuth login mechanism for JupyterHub. In oauthenticator from version 0.12.0 and before 0.12.2, the deprecated (in jupyterhub 1.2) configuration `Authenticator.whitelist`, which should be transparently mapped to `Authenticator.allowed_users` with a warning, is instead ignored by ...
CVE-2020-28576
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version and build information.
CVE-2020-28577
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal server hostname and db names.
CVE-2020-28582
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal number of managed agents.
CVE-2020-28583
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version, build and patch information.