dcsimg
 

Mobile Security, Critical Infrastructure Key Topics at Black Hat Conference

By CIOinsight  |  Posted 07-24-2012 Print

WEBINAR:
On-Demand

Transforming Banks for a Digital Future: The Winners, The Losers, and the Strategies to Beat the Odds


Black Hat, the annual convention for security researchers, features a number of talks related to privacy, critical infrastructure and mobile security particularly Apple's iOS mobile operating system.

Black Hat USA, the annual convention for security researchers now in its 15th year, began July 21 with training sessions, and will continue until Thursday, July 26.

This year's conference is expected to draw some 6,500 attendees and feature 82 sessions across nine different tracks. It will also include the release of 36 tools, 17 zero-day disclosures and 49 on-stage demonstrations.

This year's conference features a number of talks related to privacy, critical infrastructure and mobile security particularly Apple's iOS mobile operating system, which the company itself will be on hand to discuss while numerous security researchers take a poke at it in their own presentations. Google Android devices will be in the spotlight as well, with researchers from Trustwave, for example, demonstrating how Google's Bouncer security system can be bypassed to target Google's app store.

On the critical infrastructure front, there will be a talk on July 25 about threats to air traffic control systems presented by security researcher Andrei Costin, as well as talks on smart meter security and threats to industrial systems. Meanwhile, Robert Clark, operational attorney for U.S. Cyber Command, will be on hand to discuss the legal aspects of cyber-space operations.

The conference's general briefings will be held July 25 and July 26.



 

Submit a Comment

Loading Comments...
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.

By submitting your information, you agree that cioinsight.com may send you cioinsight offers via email, phone and text message, as well as email offers about other products and services that cioinsight believes may be of interest to you. cioinsight will process your information in accordance with the Quinstreet Privacy Policy.

Click for a full list of Newsletterssubmit