ashar

joined 2 years ago
MODERATOR OF
6
BSides Lancashire 2024 - 19 talks (www.bsideslancashire.org)
submitted 1 year ago* (last edited 1 year ago) by ashar to c/security_cpe
 

HackCon Online 2024 Playlist

HackCon Online 2024

HackCon har gått sammen med store deler av sikkerhetsmiljøet i Norge og lagd HackCon Online.

HackCon Online er gratis og arrangeres uken før selve HackCon og ble i 2024 arrangert 05.02 - 09.02.2024.

For mer informasjon se; https://www.hackcon.org/

 

"Infrastructure – the Good, the Bad and the Ugly"

Computer technology, like the railroad, gives us infrastructure that empowers innovators. The Internet and cloud computing let startups like YouTube and Instagram soar to huge valuations almost overnight, with only a handful of staff. But 21st century tech differs from the 19th century variety in that criminals also build infrastructure, from botnets through malware-as-a-service. There's also dual-use infrastructure, from Tor to bitcoins, with entangled legitimate and criminal applications. So crime can scale too. And even "respectable" infrastructure has disruptive uses. Social media enabled both Barack Obama and Donald Trump to outflank the political establishment and win power; they have also been used to foment communal violence in Asia. How are we to make sense of all this? Is it simply a matter for antitrust lawyers and cybercrime fighters, or do computer scientists have some insights to offer?

For the past twenty years, we have been studying the economics of information security. If Alice guards a system while Bob pays the cost of failure, you can expect trouble. This subject started out with concerns about infrastructure, namely payment card fraud and the insecurity of Windows. It worked on topics from the patch cycle through the behavioural economics of privacy to cybercrime. We learned that many persistent problems are down to misaligned incentives.

We are now realising that when problems scale, infrastructure is usually involved; that we need computer-science insights into scaling as well as economists' insights into incentives; and that both of us have underestimated the role of institutions. We need to understand all this better to put controls at the right level in the stack and to develop better strategies to fight cybercrime. We may also find some new directions as the regulation of technology moves up the political agenda.

Bio: Ross Anderson has devoted his career to developing security engineering as a discipline. He was a pioneer of hardware tamper-resistance, API security, peer-to-peer systems, prepayment metering and powerline communications. His other research extends from cryptography through side channels and the safety and privacy of clinical systems to technology policy. He was one of the founders of the discipline of security economics, and is PI of the Cambridge Cybercrime Centre, which collects and analyses data about online crime and abuse. He is a Fellow of the Royal Society and the Royal Academy of Engineering, as well as a winner of the Lovelace Medal – the UK's top award in computing. He holds faculty positions at both Cambridge and Edinburgh universities.

 

How cyber-crime has become organised warfare - Four Corners - ABC News In-depth

Every seven minutes a cyber-attack is reported in Australia

Millions of Australians have had their data stolen in malicious attacks, costing some businesses tens of millions of dollars in ransom. The federal government is warning the country must brace for even more strikes as cyber gangs become more sophisticated and ruthless.

Four Corners investigates the cyber gangs behind these assaults, cracking open their inner operations and speaking to a hacker who says he targets Australians and shows no remorse.

The program travels all the way to Ukraine and discovers we share a common enemy in the battle for cyber security.

 

BSides Prague 2024 schedule

BSides Prague Playlist

BSides Prague is an annual community-driven information security conference held in Prague, Czech Replublic. The event provides a platform for cybersecurity professionals, enthusiasts, and researchers to share knowledge, exchange ideas, and discuss the latest trends in the field. It's a unique opportunity to connect with like-minded individuals, expand professional networks, and stay informed about the ever-evolving cybersecurity landscape.

 

Rob Lee on detecting cyber risk in IoT and industrial control systems

How does cyber risk impact industrial control systems as well as all the other connected systems in an Internet of Things (IoT) world? And which organizations are likely to feel the impact? Dragos CEO Rob Lee outlines the threats, discusses how leaders can respond, and stresses the need for speed.

 

BSides Sofia 2024 Date: March 23 - 24, 2024

Location: Aula Maxima, University of National and World Economy, Sofia

BSides Sofia 2024 Schedule

BSides Sofia 2024 Talk videos

[–] ashar 1 points 2 years ago

that isn’t very democratic, is it?

3
submitted 2 years ago* (last edited 2 years ago) by ashar to c/security_cpe
 

The Cyber Defense Matrix (CDM)

Organisations need to prove their security credentials – both internally and to auditors, regulators, customers and other stakeholders. This web session explores the Cyber Defense Matrix – a freely-available map that can help your organisation document and track its compliance efforts and security programme.

 

Keynote: From Brazil with Love: Latin American Malware Analysis from Tactical and Strategic Cyber Threat Intel Outlook. Speakers: Cybelle Oliveira & Carlos Adriano Souza

Los ciberdelincuentes y estafadores brasileños utilizan técnicas de ingeniería social y phishing con el objetivo de engañar a las víctimas y manipular la codicia de las personas, como en las estafas Pix. Abusan de la facilidad de los recibos bancarios para cometer fraudes, roban tarjetas de crédito, subvierten las protecciones bancarias, infectan dispositivos con troyanos bancarios. Estos ciberdelitos se han ido expandiendo paulatinamente a otros países de América Latina y ya han llegado a algunos países europeos.\n \n En esta charla, detallaremos las excentricidades del panorama de amenazas brasileño, describiremos cómo opera el ciberdelito brasileño, la singularidad de los troyanos bancarios hechos en Brasil, sus características, creatividad, diferencias y similitudes entre las familias de malware. En esta charla, detallaremos las excentricidades del panorama de amenazas brasileño, describiremos cómo opera el ciberdelito brasileño, la singularidad de los troyanos bancarios hechos en Brasil, sus características, creatividad, diferencias y similitudes entre las familias de malware.

.:Cybelle Oliveira:. Senior Cyber Security Analyst – Tempest Security Intelligence

Cybelle es una orgullosa madre de gatos y analista senior de ciberseguridad en Tempest Security Intelligence en Brasil. Es una especie de chica chismosa de Malwareland: investiga lo que sucede en las desgracias cibernéticas. Además de su trabajo remunerado, Cybelle ha estado involucrada en el activismo de privacidad y seguridad durante más de 10 años y ha presentado charlas en eventos en todo el mundo, como BSides LV, Girls Hack Village (DefCon), Internet Freedom Festival, Radical Networks, Mozilla Festival, Roadsec, Cryptorave, entre otros. Cybelle es parte de la comunidad de Mozilla y directora de la organización brasileña Casa Hacker.

.:Carlos Adriano Souza:. Cyber Security Specialist – Tempest Security Intelligence

Carlos es un aventurero. Cuando no está rastreando y descubriendo cascadas, trabaja como ingeniero inverso en Tempest Security Intelligence, Brasil. Ya ha trabajado como investigador federal y tiene experiencia en ciberseguridad militar. Le apasiona comprender las amenazas cibernéticas globales y comprender cómo funciona el software.

[–] ashar 3 points 2 years ago

Stopping aid was the objective.

[–] ashar 0 points 2 years ago

I used to use news sites (BBC, Guardian mainly), but the coverage is seriously limited and quite biased.

[–] ashar 1 points 2 years ago

Mostly yes, but the EU has proposed a new law, though it might not address the main issue of handling a real AGI.

[–] ashar 6 points 2 years ago

Gaza Health Ministry statistics are credible and used by everyone including the Israeli government and military. Athough the Israelis will publicly dispute the statistics, they use them internally as the numbers are good.

[–] ashar 1 points 2 years ago

There seems to be no talk titles or description around. Also the audio is often not good.

[–] ashar 148 points 2 years ago* (last edited 2 years ago) (24 children)

“On one occasion, a handful of children, all about ages 5 to 8, were carried to the emergency room by their parents. All had single sniper shots to the head.”

How much of a shitty person do you have to be, to snipe little kids in the head?

[–] ashar 5 points 2 years ago (1 children)

Stirling Castle is the most castley castle anywhere.

Kilsyth town is a terrible place but the area around it is really nice. Loch Banton and Colzium estate, especially in the autumn rain. Auchinstarry Quarry. There are the remains of the Antonine wall around there (this is as far north as the Roman empire got).

[–] ashar 3 points 2 years ago

From memory, Iran last invaded another country 300 years ago. Israel....

[–] ashar 19 points 2 years ago (1 children)

Genocide. You know they are attempting to commit genocide and you help out. That is being complicit.

There is an "Obligation to prevent genocide (Article I)" which, according to the ICJ, has an extraterritorial scope. See the Genocide Convention Fact Sheet here https://www.un.org/en/genocideprevention/documents/Genocide%20Convention-FactSheet-ENG.pdf

[–] ashar 30 points 2 years ago (5 children)

the other option is to comply with the Houthi demands that the starvation of the people of Gaza be ended and supplies be allowed in accordance with the International Laws

[–] ashar 3 points 2 years ago

The deportation of Palestinians to anywhere else would be a war crime under the  Geneva Conventions -"Convention (IV) relative to the Protection of Civilian Persons in Time of War. Geneva, 12 August 1949".

To quote "Individual or mass forcible transfers, as well as deportations of protected persons from occupied territory to the territory of the Occupying Power or to that of any other country, occupied or not, are prohibited, regardless of their motive."

Source: https://ihl-databases.icrc.org/en/ihl-treaties/gciv-1949/article-49?activeTab=undefined

view more: ‹ prev next ›