Subscribe free to our newsletters via your
. Space Industry and Business News .




CYBER WARS
Computer hackers and defenders mix in Las Vegas
by Staff Writers
San Francisco (AFP) July 23, 2012


Rival factions from the Internet security world will mix warily this week at a pair of Las Vegas conferences gathering computer security experts and software savants who make sport of hacking them.

More than 6,500 high-level security experts will attend the Black Hat conference already under way, with many apt to swap surnames for code-names and stay for the infamous Def Con gathering of hackers that starts on Thursday.

Black Hat plays out in posh ballrooms at Caesar's Palace on the Las Vegas strip with big-name sponsors including Microsoft, Qualys, Looking Glass, Cisco, IBM, Hewlett Packard, and Amazon.com.

Def Con unfolds in the Rio hotel and casino on the opposite side of the Las Vegas Freeway, with attendees plunking down $200 each in cash to hear how to crack anything from smartphones and power grids to door locks.

While Black Hat has invitation-only evening soirees at hot clubs, Def Con draws crowds to its annual Toxic BBQ in a local park, "Hacker Jeopardy" team drinking games, and all-night hacker duels.

As different as the Black Hat and Def Con scenes may seem, the realms have been converging with the shift of threats from brilliant kids showing off online to cyber attacks by nation states, industrial spies, and criminal gangs.

The founder of both Def Con and Black Hat, Jeff Moss, is now chief of security at US-based Internet Corporation for Assigned Names and Numbers, the agency in charge of website addresses.

Security firms started by longtime Def Con hackers or which have hired them for key positions have become key players at Black Hat.

A "Spot the Fed" game that began in early Def Con days as a way to ferret out undercover cops has evolved into a playful way to break the ice between hackers and police who attend to sharpen crime fighting skills and recruit talent.

Def Con on Saturday revealed that this year's "top-secret VIP speaker" will be US National Security Agency (NSA) director General Keith Alexander, who will give a presentation titled "Shared Values, Shared Responsibility."

"Dark Tangent has been working to get a speaker this high-profile from the NSA for quite a long time, and we're excited that he's coming to our 20th anniversary shindig," Def Con said at its website, referring to Moss by his hacker name.

Press covering Def Con were sent safety tips that include shunning bank teller machines near the conference because of potential hacking and shutting off wireless connection features on all gadgets to thwart cyber attacks.

"You are entering one of the most hostile environments in the world," Def Con organizers warned. "Prepare to hack and be hacked."

After leaving Las Vegas, change all online passwords just to be safe, Def Con organizers added.

While the potential to hack into power plants, mass transit systems and other high-profile targets grab headlines during the back-to-back gatherings, ramped up attacks on smartphones will be among hot topics for attendees.

"The biggest trend of the moment revolves around mobile devices," said Qualys director of engineering Ivan Ristic, who will give a Black Hat presentation on tightening security at websites.

"Every single year we see a greater diversity of mobile devices used in every layer of our society," he continued.

"There is an increasingly hostile environment and yet an increase in the exchange of information."

Smartphones and tablet computers have become popular devices for online shopping, banking and other exchanges involving potentially valuable personal information.

Black Hat briefings at which findings are presented will begin on Wednesday.

"I've been attending Black Hat for years; the most popular talks are those demonstrating how to break things," Ristic told AFP.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
'Minority Report' software hits the real world
Washington (AFP) July 22, 2012
The software behind the film "Minority Report" - where Tom Cruise speeds through video on a large screen using only hand gestures - is making its way into the real world. The interface developed by scientist John Underkoffler has been commercialized by the Los Angeles firm Oblong Industries as a way to sift through massive amounts of video and other data. And yes, the software can be u ... read more


CYBER WARS
Apple wants billions from Samsung in patent fight

SWF Announces International Dialog on Satellite Servicing and Debris Removal

Tablets to push US electronic sales above $200 bn

Researchers Almost Double Light Efficiency in LC Projectors

CYBER WARS
Lockheed Martin Completes On-Orbit Testing of First US Navy MUOS Satellite

Northrop Grumman's RC-12X Airborne Signals Intelligence System Completes 1,000th Mission

Raytheon's vehicular soldier radio system links 37 different types of US, coalition radios

Lockheed Martin to Support Intelligence Analysis Worldwide Under DIA Solutions Contract

CYBER WARS
NASA Partner United Launch Alliance Completes Two Atlas V Reviews

The Spaceport maintains its mission cadence for Ariane 5 flights

S. Korea plans fresh rocket launch in October

NASA Selects Launch Services Contract for Jason-3 Mission

CYBER WARS
SSTL announces the launch of exactView-1

GMV Leads Satellite Navigation Project In Collaboration With The South African National Space Agency

SSTL signs contract with OHB for second batch of Galileo payloads

Phone app will navigate indoors

CYBER WARS
International F-35 Fleet Begins Build Up At Eglin AFB

US 'confident' F-22 jet oxygen problems solved

European hybrid helicopter finishes US tour

United Kingdom Accepts First International Lockheed Martin F-35

CYBER WARS
Chips with self-assembling rectangles

Getting Amped

Frog calls inspire a new algorithm for wireless networks

Unique properties of graphene lead to a new paradigm for low-power telecommunications

CYBER WARS
Earth-observing Camera Launches to International Space Station

Landsat Looks and Sees

Why Is Earth So Dry?

GeoEye Signs Two New Seven-Figure GeoEye-1 Imagery Contracts

CYBER WARS
Olympics: Bhopal victims organise protest Games

To clean up the mine, let fungus reproduce

NASA, Partners Announce Launch: Beyond Waste Innovators

Green plants reduce city street pollution up to eight times more than previously believed




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement