24 Jun 2010
Over the next few weeks leading up to The Next HOPE, we will be
highlighting some of the many different talks and panels that will be
featured at the conference. In the end, we will have over 100 talks
throughout the three day period from July 16-18 at the Hotel
Pennsylvania in New York City. And the talks are just one part of the
entire weekend of activity.
Here are 35 talks you can see at The Next HOPE. Five more will be posted
Why You Should Be an Amateur Lots of people think the "maker culture" is
a relatively new phenomenon. However, one group has been doing it for
close to 100 years: amateur radio operators. While some dismiss amateur
radio as an aging artifact from decades ago, today's radio amateurs are
putting together wide area wireless networks, developing digital
protocols that use the tiniest amount of bandwidth, and building radios
from scratch. Ben Jackson will review the basics of amateur radio, the
advantages over unlicensed devices, and areas of interest you can apply
to your existing projects.
Social Engineering People have been known to come to HOPE just for this
panel, in which the history, stories, and demonstrations of social
engineering are laid out for all to see - and hear. Something will
invariably be revealed over the telephone by someone who really should
know better in our traditional live demonstration that never fails to
entertain. Join Emmanuel Goldstein and friends for some fun.
Smartphone Ownage: The State of Mobile Botnets and Rootkits Symbian
Botnet? Mobile Linux Rootkits? iPhone Botnets? Millions of phones at
risk? The press coverage on smart phone threats is at times somewhat
accurate, distant, and occasionally (if unintentionally) misleading.
They tend to raise questions such as: How close to PC levels (100,000+
to millions of nodes) have mobile botnets reached? Have mobile rootkits
reached the complexity of those on the PC? Jimmy Shah will cover the
state of rootkits and botnets on smart phones from the perspective of
anti-malware researchers, including demystification of the threat from
mobile rootkits and mobile botnets, the differences (if any) between
mobile rootkits and mobile botnets vs. their PC counterparts, and a look
at how samples seen in the wild and researcher PoCs function.
Into the Black: DPRK Exploration North Korea scares people. Allegedly,
the DPRK has a super l33t squad of killer haxor ninjas that regularly
engage in hit and run hacks against the Defense Department, South Korea,
or anyone else who pisses off the Dear Leader. The DPRK also has no real
Internet infrastructure to speak of (as dictators don't like
unrestricted information), although it does have a number of IP blocks.
Michael Kemp will examine some of the myths about the DPRK, and some of
their existing and emerging technologies. Some of the available
infrastructure associated with DPRK (funnily enough, some of which is in
South Korea and Japan) will be discussed and the potential technical
threats posed by a pernicious regime analyzed.
Attend Black Hat USA 2010, hosted at Caesars Palace in Las Vegas, Nevada
July 24-29th, offering over 60 training sessions and 11 tracks of Briefings
from security industry elite. To sign up visit http://www.blackhat.com