Risk

6/14/2012
06:12 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Black Hat Releases Complete Event Schedule

Among the news breaking will be 36 tools, 17 0-days, and 49 live on-stage demonstrations

SAN FRANCISCO, June 14, 2012 /PRNewswire/ -- Black Hat, producer of the world's premier information security events, today announced the official schedule for Black Hat USA 2012, where the smartest and most disruptive cyber security professionals will reveal research and vulnerabilities that threaten national critical infrastructure and identify flaws in popular consumer devices. Among the news breaking will be 36 tools, 17 0-days and 49 live onstage demonstrations during the action packed week of July 21-26 2012 in Las Vegas. For more information and to register, visit Black Hat.

Click here for more of Dark Reading's Black Hat articles.

The keynote speakers at Black Hat USA 2012 include Neal Stephenson, one of the world's foremost historical and science fiction authors, and Shawn Henry, former FBI Executive Assistant Director (EAD) and currently President of CrowdStrike Services. Neal will take the stage for an interactive interview with attendees while Shawn will offer new insights on how a hostile cyber environment has rendered traditional security obsolete in a talk entitled: "Changing the Security Paradigm…Taking Back Your Network and Bringing Pain to The Adversary."

Black Hat USA 2012 will feature talks that point out key security vulnerabilities in global and national infrastructure, including:

Threats to air traffic control systems (Andrei Costin), smart meters and the power grid (Don Weber). Stephen Ridley and Stephen Lawler will address advanced ARM exploitation and share some anecdotal "hardware hacking" experiences. Yann Allain and Julien Moinard will discuss power analysis of embedded systems. Methods for taking cyber security on the offensive: Renowned security researcher Dan Kaminsky will offer a look at "black ops," offering insight on attack techniques that previously may have been considered 'wrong and evil.' Robert Clark, operational attorney for the U.S. Army Cyber Command, will offer a look at the legal aspects of cyberspace operations. Apple operating systems and applications: speakers will discuss flaws in the Apple AppStore (Justin Engler, Seth Law, Joshua Dubik, and David Vo); vulnerabilities in the operating system kernel that drives IOS and Mac OS X (Stefan Esser); and a workshop on the dark art of IOS application hacking (Jonathan Zdziarski). Threats and vulnerabilities to the most commonly used Web applications and tools, demonstrating key vulnerabilities at the very core of today's Internet. Sheeraj Shah offers a look at the Top 10 threats, while Sergey Shekyan and Vaagn Toukharian discuss hacking with HTML5's WebSockets; a look at recent Java exploitation trends and malware (Jeong Wook Oh); and the revelation of several new vulnerabilities in popular Web application firewalls (Ivan Ristic).

Black Hat will feature nine concurrent tracks every day, mixing workshops, roundtables and cutting edge presentations by top security experts. Deep technical training will take place July 21-24, while the open briefings will run from July 25-26.

Black Hat on Facebook; Black Hat on LinkedIn; #BlackHatEvents on Twitter; Black Hat Events on Flickr.

Sponsors of this year's Black Hat include Diamond Sponsors Qualys, Microsoft and Lookingglass Cyber Solutions; Platinum Sponsors Accuvant LABS, Blue Coat Systems, Core Security, Cisco, IBM, Juniper Networks, LogRhythm, RSA, Symantec, Trustwave and Verizon.

About Black Hat

Black Hat provides briefings and training to leading corporations and government agencies around the world. Black Hat differentiates itself by working at many levels within the corporate, government, and underground communities. This unmatched informational reach enables Black Hat attendees to be continuously aware of the newest vulnerabilities, defense mechanisms, and industry trends. Black Hat Briefings and Trainings are held annually in Europe and Las Vegas. Black Hat is produced by UBM TechWeb. More information is available at www.blackhat.com.

About UBM TechWeb

UBM TechWeb, the global leader in technology media and professional information, enables people and organizations to harness the transformative power of technology. Through its three core businesses – media solutions, marketing services and paid content – UBM TechWeb produces the most respected and consumed brands and media applications in the technology market. More than 14.5 million business and technology professionals (CIOs and IT managers, Web & Digital professionals, Software Developers, Government decision makers, and Telecom providers) actively engage in UBM TechWeb's communities and information resources monthly. UBM TechWeb brands include: global face-to-face events such as Interop, Black Hat and Enterprise Connect; award-winning online resources such as InformationWeek, Dark Reading, and Network Computing; and market-leading magazines InformationWeek, Wall Street & Technology, and Advanced Trading. UBM TechWeb is a UBM plc. company, a global provider of news distribution and specialist information services with a market capitalization of more than $2.5 billion.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Devastating Cyberattack on Email Provider Destroys 18 Years of Data
Jai Vijayan, Freelance writer,  2/12/2019
Up to 100,000 Reported Affected in Landmark White Data Breach
Kelly Sheridan, Staff Editor, Dark Reading,  2/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8354
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow.
CVE-2019-8355
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c.
CVE-2019-8356
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.
CVE-2019-8357
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference.
CVE-2013-2516
PUBLISHED: 2019-02-15
Vulnerability in FileUtils v0.7, Ruby Gem Fileutils <= v0.7 Command Injection vulnerability in user supplied url variable that is passed to the shell.