[ISN] Deadline Approaching: INFOSEC2014 – Malaysia

Forwarded from: “Jackie Blanco” The International Conference on Information Security and Cyber Forensics (InfoSec2014) Universiti Sultan Zainal Abidin (UniSZA), Kuala Terengganu, Malaysia October 8-10, 2014 | infosec (at) sdiwc.net http://sdiwc.net/conferences/2014/infosec2014/ All registered papers will be included in SDIWC Digital Library. ================================================================ The conference aims to enable researchers build connections between different digital applications. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures. TOPICS ARE NOT LIMITED TO: :: Cyber Security :: Distributed and Pervasive Systems Security :: Formal Methods Application in Security :: Incident Handling and Penetration Testing :: Multimedia and Document Security :: Privacy issues :: Secure Software Development, Architecture and Outsourcing :: Security in Cloud Computing :: Security of Web-based Applications and Services :: VOIP, Wireless and Telecommunications Network Security :: Enterprise Systems Security :: Hardware-Based security :: Legal Issues :: Operating Systems and Database Security :: SCADA and Embedded systems security :: Security for Future Networks :: Security in Social Networks :: Security protocols :: Digital Forensic :: Anti-Forensics and Anti-Anti-Forensics Techniques :: Data leakage, Data protection and Database forensics :: Executable Content and Content Filtering :: Forensics of Virtual and Cloud Environments :: Investigation of Insider Attacks :: Malware forensics and Anti-Malware techniques :: New threats and Non-Traditional approaches :: Cyber-Crimes :: Evidentiary Aspects of Digital Forensics :: File System and Memory Analysis Multimedia Forensic :: Information Hiding :: Large-Scale Investigations :: Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics :: Information Assurance and Security Management :: Business Continuity & Disaster Recovery Planning :: Critical Infrastructure Protection :: Digital Rights Management and Intellectual Property Protection :: Fraud Management :: Laws and Regulations :: Threats, Vulnerabilities, and Risk Management :: Corporate Governance :: Decidability and Complexity :: Economics of Security :: Identity Management :: Security Policies and Trust Management :: Cyber Peacefare and Physical Security :: Authentication and Access Control Systems :: Biometrics standards and standardization :: Electronic Passports, National ID and Smart Card Security :: Social engineering :: Template Protection and Liveliness detection :: Biometrics Applications :: Cyber Peacefare Trends and Approaches :: New theories and algorithms in biometrics :: Surveillance Systems Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered. PAPER SUBMISSION: http://sdiwc.net/conferences/2014/infosec2014/openconf/openconf.php IMPORTANT DATES: Submission Deadline: September 26, 2014 Notification of Acceptance: 2-4 weeks from the submission date Camera Ready Submission: October 2, 2014 Registration Deadline: October 2, 2014 Conference Dates: October 8-10, 2014 CONTACT: Jackie Blanco | infosec (at) sdiwc.net SDIWC Organization | www.sdiwc.net




Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Your fitness tracker is a SNITCH says Symantec

http://www.theregister.co.uk/2014/08/04/your_fitness_tracker_is_a_snitch_says_symantec/ By Richard Chirgwin The Register 4 Aug 2014 If you’re the kind of person whose gadgets auto-tweet your exercise, sex or sleep habits – all vanguard applications of the odiously-named “quantified self” movement – you can be tracked, identified and hacked, according to Symantec. In this post, the security outfit explains that the age-old desire for gadget convenience has, once again, taken security out behind the shed for a quiet bullet. With a handful of suitably-equipped Raspberry Pi devices, the company says, it was able to demonstrate that devices are trackable, some of them use apps that pass sensitive data in clear text, data leakage is common, and some offerings had poor security at the server-side. Both wearables and apps that use smartphone sensors were examined in the test. The tracker-tracker, which Symantec dubs “Blueberry Pi”, is nothing more than an RPi with Bluetooth 4.0, a battery pack, a 4GB SD card, open source software and a little custom scripting, put together for $USD75. These were tested in public areas in Ireland and Switzerland, including at a public footrace. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] ‘Thought-out policy needed for gray-hat hackers’

http://www.koreaherald.com/view.php?ud=20140803000316 By Song Sang-ho Korea Herald 2014-08-03 In South Korea, one of the world’s most wired nations, there are many cybersavvy youngsters, or “gray-hat hackers,” who flirt with the idea of breaking into computer networks of firms or state entities. Most have no grasp of the illegality of their activities. These hackers could become cybersecurity specialists, called “white-hat” hackers, or malicious “black-hat” hackers who would pose transnational cybersecurity challenges unless the government addresses them. During a recent interview with The Korea Herald, Son Tae-jong, a senior research fellow at the Korea Institute for Defense Analyses, stressed the need for Seoul to craft an effective strategy to help young computer buffs chart positive career paths and contribute to advancing national interests. “Considering that (gray-hat hackers) are often liberal and defiant, the nation should embrace them with a well-thought-out strategy. Otherwise, they could become cyberterrorists or black-hat hackers who would threaten national security,” said Son. Son also underscored the need to promote the positive aspects of the military’s cybersecurity operations as negative views about them have prevailed so far due to the cyberwarfare authorities’ alleged interference in domestic politics. The following is the interview with Son Tae-jong: […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail