Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
LAS VEGAS, NV -- (Marketwired) -- 08/05/15 -- Black Hat USA -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), the largest pure-play security vendor globally, today announced that seven sessions will be presented by Check Point cyber security experts at Black Hat USA 2015 and DEF CON 23.
Check Point @ Black Hat USA
In a briefing session, Avi Bashan, mobile threat detection technology leader, and Ohad Bobrov, director of Mobile Threat Prevention, will be presenting the discovery of a massive vulnerability plaguing Android devices, allowing the malicious takeover of millions of devices out of the box.
WHAT: Certifi-Gate: Front-door Access to Pwning Millions of Androids with Avi Bashan and Ohad Bobrov
WHEN: August 6, 2015 at 9:45 AM PT
WHERE: Mandalay Bay | South Seas CDF
Omri Herscovici, security researcher, will be demonstrating CapTipper, a python tool he developed to analyze, explore, and revive HTTP malicious traffic. The tool provides security researchers with easy access to served files and understanding of the network flow, and is useful for researching exploits, as well as various pre-conditions, versions, obfuscations, plugins and shellcodes.
WHAT: CapTipper with Omri Herscovici
WHEN: August 5, 2015 at 3:30 PM PT
WHERE: Mandalay Bay | Breakers DEJK Station 3
David Oren, exploit research team leader, will outline CuckooSploit, an environment for comprehensive, automated analysis of web-based exploits, based on the Cuckoo Sandbox.
WHAT: CuckooSploit with David Oren
WHEN: August 6, 2015 at 3:30 PM PT
WHERE: Mandalay Bay | Breakers DEJK Station 8
Idan Revivo and Ofer Caspi, members of the malware research team, will provide a demonstration of CuckooDroid, an Android malware analysis solution based on the popular open source framework Cuckoo Sandbox to automate the malware investigation process.
WHAT: CuckooDroid - an Automated Malware Analysis Framework with Idan Revivo & Ofer Caspi
WHEN: August 6, 2015 at 3:30 PM PT
WHERE: Mandalay Bay | Breakers DEJK Station 8
Check Point @ DEF CON 23
Yaniv Balmas and Lior Oppenheim, security researchers, will present their findings of a vulnerability in KVM boxes which, when exploited, turns them into key-logging devices capable of opening covert channels to bridge networks.
WHAT: Key-Logger, Video, Mouse -- How To Turn Your KVM Into a Raging Key-loggingWHEN: August 8, 2015 at 11:00 AM PT
WHERE: Paris Hotel | Track 1: Concorde
Idan Revivo and Ofer Caspi, members of the malware research team, will provide a demonstration of CuckooDroid, an Android malware analysis solution based on the popular open source framework Cuckoo Sandbox to automate the malware investigation process.
WHAT: CuckooDroid - an Automated Malware Analysis Framework with Idan Revivo & Ofer Caspi
WHEN: August 8, 2015 at 10:00 AM PT
WHERE: Bally's Hotel | Demo Labs: Gold
Follow Check Point via
Check Point Blog: http://blog.checkpoint.com/
Twitter: www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
YouTube: http://www.youtube.com/user/CPGlobal
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises' networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes. At Check Point, we secure the future.
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs