This morning in Malaysia notorious security conference Hack In The Box readies to open its doors and offer a juicy talk schedule to attending hackers, security researchers, corporate spies, law enforcement, and more.
They're letting a few journalists in, too. ZDNet is here Kuala Lumpur to bring you highlights as they happen.
Hack In The Box is at the Intercontinental Hotel Kuala Lumpur, starting today October 16th from 9am to 6pm and tomorrow, October 17th also from 9-6.
Helpful links for talk attendees:
- Hack In The Box 2013 Kuala Lumpur Talk Schedule
- HITB 2013 KL Day 1 Talk Schedule
- HITB 2013 KL Day 2 Talk Schedule
We've got a shortlist of recommended talks below, though there are many more great presentations on the schedule.
If you can't teleport to Malaysia today, we'll be on hand to share all the exciting security drama - and Hack In The Box will post links to talk materials immediately after each talk on the HITB Twitter account, and videos to its YouTube account.
- Day 1 Keynote, Cognitive Injection: Reprogramming the Situation-Oriented Human OS - Andy Ellis (Chief Security Officer, Akamai)
- Hey Captain! Where’s your Ship? Attacking Vessel Tracking Systems for Fun and Profit (Day 1) – Marco Balduzzi, Kyle Wilhoit, Alessandro Pasta
- Going Deeper Into Aviation Security (Day 2) – Hugo Teso
Privacy and Social Networking
- Using Online Activity as Digital DNA to Create a Better Spear Phisher (Day 1) – Joaquim Espinhara & Ulisses Albuquerque
- Practical Attacks Against Encrypted VoIP Communications (Day 1) - Dominic Chell & Shaun Colley
- Trusted Friend Attack: When Guardian Angels Strike (Day 2) - Ashar Javed
- Facebook OSINT: It’s Faster Than Speed Dating (Day 2) – Keith Lee & Jonathan Werrett
Corporate Espionage and Hardware Attacks
- Thwarting Evil Maid Attacks: Physically Unclonable Functions for Hardware Tamper Detection - (Day 2) Eric Michaud (Rift Recon) & Ryan Lackey (Cryptoseal)
Apple iOS and OS X Security
- SHAttered Dreams (Day 1) – Joshua ‘@p0sixninja’ Hill
- How Apple Can Read Your iMessages and How You Can Prevent It (Day 2) – Cyril ‘@pod2g’ Cattiaux & GG
- Tales from iOS 6 Exploitation and iOS 7 Security Changes (Day 2) – Stefan Esser
- Cracking and Analyzing Apple’s iCloud Protocols (Day 2) - Vladimir Katalov
Wireless Technology Abuse
- RFIDler – A Software Defined RFID Reader/Writer/Emulator (Day 1) – Adam ‘Major Malfunction’ Laurie
The lavish InterContinental Hotel serves as the stage for this year's 41 speakers, a collection comprised of hackers, security professionals, law enforcement, corporate intelligence representatives, and more.
Stay tuned - we'll be posting conference galleries each day, interviews with star speakers and posting news, drama and exploits as it all happens here in Kuala Lumpur.
- See also: