Posted by: Troy Tate
antivirus, blackhat, bootkit, Database, Development, education, hacker, information security, infosec, least user authority, least user privilege, malware, research, rootkit, threats, vulnerabilities
The media archives have now been posted on the BlackHat website from the BlackHat technical conference held in July 2009. This is the place to go if you want to see some of the latest information security research and the threats that are REAL and may become real someday. I posted a previous blog entry on the presentation about the Bootkit – rootkit – malware bypasses disk encryption!
Some of the presentation titles:
I Just Found 10 Million SSN’s
Sniff Keystrokes With Lasers/Voltmeters
Side Channel Attacks Using Optical Sampling of Mechanical Energy and Power Line Leakage
Anti-Forensics: The Rootkit Connection
Reversing and Exploiting an Apple® Firmware Update
The Language of Trust: Exploiting Trust Relationships in Active Content
Mo’ Money Mo’ Problems: Making A LOT More Money on the Web the Black Hat Way
The Conficker Mystery
These are just some of the titles available in the BlackHat 2009 Technical Conference media library. Check it out even if you are a web developer or an IT professional who manages desktops or networks or staff members who perform these tasks. You need to know what you are up against and possible methods to fight the threats.
Thanks for reading & lets continue to be good network citizens!