Ergebnis 1 bis 2 von 2
  1. #1
    ٠•●• ॐ •●•٠ Avatar von meckl
    Registriert seit
    08.06.2007
    Beiträge
    749

    Standard Ethical malcoders get their own conference

    Ethical malcoders get their own conference

    You have heard of Black Hat, Defcon, RSA Conference and Info Security, but does the name MalCon ring a bell?

    Probably not, since the newly started conference on malware is yet to be held for the first time and it's only in the call-for-papers phase of its existence. But, the main theme is likely to raise a few eyebrows in the security community, for many may feel as Bruce Schneier does: "The bad guys produce more than enough malware to stimulate research."

    But this opinion will not prevent him to make an appearance as leading speaker in Mumbai and Pune (India) on December 3rd and 5th, respectively, when the conference is scheduled to be hosted.

    Likewise intrigued by the notion, Brian Krebs contacted Rajshekhar Murthy, MalCon's coordinator, to find out more about the event.

    He found out that the conference organizers are indeed trying to attract as many "ethical malware authors" as possible. The goal of the conference is to "encourage and foster the creation of malcode", and to promote the cooperation between these malware creators and the security companies.

    "Just like the concept of ‘ethical hacking’ has helped organizations to see that hackers are not all that bad, it is time to accept that ‘ethical malcoding’ is required to research, identify and mitigate newer malwares in a ‘proactive’ way,” says Murthy.

    The official website lists a number of categories for submitted papers to fall into:
    • Hacking tools - any rogue tools, phishing kits, code that aids any malware or malicious activity
    • Malware - rootkits, Trojans, viruses, keyloggers, mobile malware, etc.
    • Malware creation tools
    • Web based malware - Web-shells, browser runtime malwares (Javascript, Flash)
    • Malware infection and propagation - infection techniques, target enumeration techniques, cross-platform infection, etc.
    • Malware self-defense mechanism - AV detection and exploitation techniques, anti-reversing and anti-debugging techniques, secure malware communication, etc.

    A number of workshops will also be held during the conference, and any malware that will be presented on the conference and that takes advantage of a 0-day exploit will be shared with the affected vendors prior to any public release.

    Quelle: net-security.org
    ♫ *´¨)
    ¸.•´¸.•*´¨) ¸.•*¨♫ ♪
    (¸.•´ (¸.• ♫ ♪ Psychedelic



  2. Folgende Benutzer haben sich für diesen Beitrag bedankt:

    inyourface (31.08.2010)

  3. #2
    Citrix ♥ Avatar von inyourface
    Registriert seit
    30.07.2007
    Beiträge
    1.635

    Standard

    Der 7-stündige Workshop würde mich wirklich mal interessieren.
    Citrix Certified Expert - Virtualization (CCE-V)

    Zitat Zitat von Suicide Beitrag anzeigen
    13J0hn.X3r37

Ähnliche Themen

  1. Certified Ethical Hacker 3.0 Official Course
    Von meckl im Forum Biete Tutorials
    Antworten: 7
    Letzter Beitrag: 21.08.2008, 21:48
  2. Certified Ethical Hacker 9CDs
    Von d4nNiiiSTAR im Forum Video-Tutorials
    Antworten: 3
    Letzter Beitrag: 25.07.2008, 13:37
  3. Ec-council | Certified Ethical Hacker Version 5
    Von meckl im Forum Video-Tutorials
    Antworten: 5
    Letzter Beitrag: 20.01.2008, 09:41
  4. HSC Ethical Hacker Kit
    Von loster im Forum Trashbox
    Antworten: 0
    Letzter Beitrag: 25.09.2007, 16:12

Stichworte

Berechtigungen

  • Neue Themen erstellen: Nein
  • Themen beantworten: Nein
  • Anhänge hochladen: Nein
  • Beiträge bearbeiten: Nein
  •