Risk
6/14/2012
06:12 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Black Hat Releases Complete Event Schedule

Among the news breaking will be 36 tools, 17 0-days, and 49 live on-stage demonstrations

SAN FRANCISCO, June 14, 2012 /PRNewswire/ -- Black Hat, producer of the world's premier information security events, today announced the official schedule for Black Hat USA 2012, where the smartest and most disruptive cyber security professionals will reveal research and vulnerabilities that threaten national critical infrastructure and identify flaws in popular consumer devices. Among the news breaking will be 36 tools, 17 0-days and 49 live onstage demonstrations during the action packed week of July 21-26 2012 in Las Vegas. For more information and to register, visit Black Hat.

Click here for more of Dark Reading's Black Hat articles.

The keynote speakers at Black Hat USA 2012 include Neal Stephenson, one of the world's foremost historical and science fiction authors, and Shawn Henry, former FBI Executive Assistant Director (EAD) and currently President of CrowdStrike Services. Neal will take the stage for an interactive interview with attendees while Shawn will offer new insights on how a hostile cyber environment has rendered traditional security obsolete in a talk entitled: "Changing the Security Paradigm…Taking Back Your Network and Bringing Pain to The Adversary."

Black Hat USA 2012 will feature talks that point out key security vulnerabilities in global and national infrastructure, including:

Threats to air traffic control systems (Andrei Costin), smart meters and the power grid (Don Weber). Stephen Ridley and Stephen Lawler will address advanced ARM exploitation and share some anecdotal "hardware hacking" experiences. Yann Allain and Julien Moinard will discuss power analysis of embedded systems. Methods for taking cyber security on the offensive: Renowned security researcher Dan Kaminsky will offer a look at "black ops," offering insight on attack techniques that previously may have been considered 'wrong and evil.' Robert Clark, operational attorney for the U.S. Army Cyber Command, will offer a look at the legal aspects of cyberspace operations. Apple operating systems and applications: speakers will discuss flaws in the Apple AppStore (Justin Engler, Seth Law, Joshua Dubik, and David Vo); vulnerabilities in the operating system kernel that drives IOS and Mac OS X (Stefan Esser); and a workshop on the dark art of IOS application hacking (Jonathan Zdziarski). Threats and vulnerabilities to the most commonly used Web applications and tools, demonstrating key vulnerabilities at the very core of today's Internet. Sheeraj Shah offers a look at the Top 10 threats, while Sergey Shekyan and Vaagn Toukharian discuss hacking with HTML5's WebSockets; a look at recent Java exploitation trends and malware (Jeong Wook Oh); and the revelation of several new vulnerabilities in popular Web application firewalls (Ivan Ristic).

Black Hat will feature nine concurrent tracks every day, mixing workshops, roundtables and cutting edge presentations by top security experts. Deep technical training will take place July 21-24, while the open briefings will run from July 25-26.

Black Hat on Facebook; Black Hat on LinkedIn; #BlackHatEvents on Twitter; Black Hat Events on Flickr.

Sponsors of this year's Black Hat include Diamond Sponsors Qualys, Microsoft and Lookingglass Cyber Solutions; Platinum Sponsors Accuvant LABS, Blue Coat Systems, Core Security, Cisco, IBM, Juniper Networks, LogRhythm, RSA, Symantec, Trustwave and Verizon.

About Black Hat

Black Hat provides briefings and training to leading corporations and government agencies around the world. Black Hat differentiates itself by working at many levels within the corporate, government, and underground communities. This unmatched informational reach enables Black Hat attendees to be continuously aware of the newest vulnerabilities, defense mechanisms, and industry trends. Black Hat Briefings and Trainings are held annually in Europe and Las Vegas. Black Hat is produced by UBM TechWeb. More information is available at www.blackhat.com.

About UBM TechWeb

UBM TechWeb, the global leader in technology media and professional information, enables people and organizations to harness the transformative power of technology. Through its three core businesses – media solutions, marketing services and paid content – UBM TechWeb produces the most respected and consumed brands and media applications in the technology market. More than 14.5 million business and technology professionals (CIOs and IT managers, Web & Digital professionals, Software Developers, Government decision makers, and Telecom providers) actively engage in UBM TechWeb's communities and information resources monthly. UBM TechWeb brands include: global face-to-face events such as Interop, Black Hat and Enterprise Connect; award-winning online resources such as InformationWeek, Dark Reading, and Network Computing; and market-leading magazines InformationWeek, Wall Street & Technology, and Advanced Trading. UBM TechWeb is a UBM plc. company, a global provider of news distribution and specialist information services with a market capitalization of more than $2.5 billion.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
Why Cybersecurity Must Be an International Effort
Kelly Sheridan, Associate Editor, Dark Reading,  12/6/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.