Showing posts sorted by relevance for query BlackHat. Sort by date Show all posts
Showing posts sorted by relevance for query BlackHat. Sort by date Show all posts

Black Hat, the World's Leading Security Conference, on Abu Dhabi



IT security professionals will be delighted to learn the UAE Telecommunications Regulatory Authority (TRA), represented by the UAE Computer Emergency Response Team (aeCERT), in cooperation with Khalifa University of Science and Technology, has partnered with UBM again to bring the second edition of the world's leading information security conference, Black Hat to Abu Dhabi.
This year's Black Hat Abu Dhabi will take place from the 12th to 15th December 2011 at the luxurious Emirates Palace and will concentrate on 2 days of training sessions and 2 days of briefings which will discuss and demonstrate the latest and most important security issues faced in the market today.  Last year, this included among others, a new Android attack demonstration, new web attack and password cracking tool, a new chip was broken, new code released, a new ID card was broken and new Stuxnet conclusions were presented.
The event fits with aeCERT policy to assist the process of identifying, preventing and responding to cyber security attacks; coming up with operating mechanisms for the TRA's strategy to increase cyber security in the UAE.
His Excellency Mohamed Nasser Al Ghanim, Director General of the TRA, said: "We have decided to partner with UBM to hold Black Hat Abu Dhabi for a second time because of the increasing need to protect our IT systems from attack, because of the enormous success of the first Black Hat Abu Dhabi and partnership fostered between UBM, the TRA, aeCERT and Khalifa University.  The event continues to support the TRA vision to make the UAE's ICT sector a leader in the global market place.  As such, the TRA is proud to be the leading partner of Black Hat Abu Dhabi for the second time."
UBM is inviting potential sponsors, exhibitors and delegates to take part in Black Hat Abu Dhabi, which will attract only the highest-placed security professionals from government entities, academia and private companies with the power to make security buying decisions.  


Jeff Moss, founder and Conference Chair of Black Hat, stated: "We are excited to be able to bring Black Hat back to the Middle East. Our partners are continuing thevisionto establish a culture of cybersecurity within their public and private sector organizations and Black Hat is supporting those endeavours by bringing the best trainings and latest research to Abu Dhabi and the Middle East. We will to continue to build upon the foundation from last year's event and once again showcase the commitment of the UAE ICT sector to being a leader in the globalmarkets for security."


Black Hat Abu Dhabi will offer a full range of sessions, including ten training programmes running on 12th and 13th December, followed by three briefing tracks running simultaneously on the 14th and 15th alongside the exhibition.
Companies, government agencies, associations, institutions and individuals who wish to get involved as a sponsor or delegate should contact the organiser UBM Middle East.  
For more information or to register your interest please visit: http://www.blackhat.com or contact becky.crayman@ubm.com.
Notes to the editor
For more information please see http://www.blackhat.com  
Individuals, associations, government bodies, academic institutions and companies interested in finding out more about Black Hat Abu Dhabi should contact the organisers, UBM Middle East for information, on +971-2-406-4471 or email becky.crayman@ubm.com
Black Hat briefings and training is the largest and most important security conference series in the world.  Black Hat Abu Dhabi is organised by UBM Middle East on behalf of TechWeb, a division of United Business Media.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

TeaMp0isoN Threatened Authorities After Leader's Arrest

TeaMp0isoN Threatened Authorities After Leader's Arrest 

Few days ago a hacker collective group named TeaMp0isoN took responsibility of hacking into British intelligence agency (MI6). Immediately after the attack MI6 arrested the leader of TeaMp0isoN code named "TriCk" along with few other active members who ware directly involved behind the Denial of Service attack on MI6. But the story is not over yet. The official twitter account of TeaMp0isoN issued a warning that it will fight back against the arrest of its members. 

The group linked to a Pastebin statement with a call for other hackers to unite in attacking law enforcement agencies. 

Message of TeaMp0isoN:- 
"We've lost the first and most important member of our team; our founder, our brother, our family member. Most importantly we lost a fighter for freedom, a fighter against corruption.
He strived for justice, and constantly fought against oppression and corruption, to help spread awareness on humanitarian causes, and now, he is no longer with us.
Most of you think that this is end of TeaMp0isoN and that this is end of our fight.
We're glad to shout:
#################################
#_ITS NOT OVER, IT JUST STARTED_#
#_ITS NOT OVER, WE ARE STRONGER_#
#_ITS NOT OVER, WE ARE UNITED_  #

#################################

I ask you, a fellow hacker, as a blackhat, to rise, to unite and to fight. For years the hacking scene for the most part has been misrepresented by skids, who have inevitably led to the copious amounts of faggotry and butthurt which currently pollutes the scene. Whitehats continue to lurk and grow, and nothing is preventing them from disclosing exploits.
As a collective we have to stop this, to ascend out of the underground and show the world we are not fucking around, something which TriCk firmly believed in. We, as hackers, have to unite to revive the blackhat scene, for TriCk... and everything that we stand for.
Do you support TeaMp0isoN? Help out via:
irc.tsukihi.me
#retaliation
-----------------------------------------
root@TeaMp0isoN:~# rm -rf skids/*
root@TeaMp0isoN:~# rm -rf whitehats/*
root@TeaMp0isoN:~# rm -rf governments/*
root@TeaMp0isoN:~# rm -rf justicesystem/*
root@TeaMp0isoN:~# rm -rf police/*

-----------------------------------------  ..."

Earlier TeaMp0isoN was directly involved with Anonymous in #OpRobinHood #OpCensorThis. Also they have found SQL-i vulnerability on the Official NASA forum, and like this attack TeaMp0isoN also hacked English Defence League (EDL) and exposed members personal data & many more.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

BackTrack 5 R3 Released & Available To Download

BackTrack 5 R3 Released & Available To Download!!

In our last post about BackTrack we mention the release date of long awaited BT 5 Release 3. So finally the countdown is over. The time has come to refresh our security tool arsenal – BackTrack 5 R3 has been released world wide. First BT5 R3 preview was released  in BlackHat 2012 Las Vegas for the enjoyment of conference attendees. The main aim of that pre-release was to figure out their last bug reports and tool suggestions from the BH / Defcon crowds. This final release mainly focuses on bug-fixes as well as the addition of over 60 new tool. A whole new tool category was populated – “Physical Exploitation”, which now includes tools such as the Arduino IDE and libraries, as well as the Kautilya Teensy payload collection.
As usual KDE and GNOME, 32/64 bit ISOs, have been released a single VMware Image (Gnome, 32 bit). 
We would also like to give to reminder that the first release candidate (R1) of BackTrack 5 was released in August last year. Later in March this year we got the second release candidate (R2) of BT 5. 
For those requiring other VM flavors of BackTrack If you want to build your own VMWare image then instructions can be found in the BackTrack Wiki. Direct ISO downloads will be available once all our HTTP mirrors have synched. But still you can download BackTrack 5 R3 via torrent from the below links. 



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

SAP Will Patch Their Vulnerability Which Was Exposed By (Blackhat 2011 US)


A reportedly serious security bug affecting the J2EE (Java 2 Platform Enterprise Edition) engine in SAP's NetWeaver middleware will be patched soon, SAP said Friday.
NetWeaver underpins SAP's range of enterprise software, including its flagship Business Suite ERP (enterprise resource planning) product. The bug was discussed by security researcher and ERPScan CTO Alexander Polyakov during a presentation at the Black Hat security conference in Las Vegas on Thursday.
The vulnerability makes it possible to crack SAP systems over the Internet by circumventing authorization checks, Polyakov wrote in a blog post before the conference. "For example, it is possible to create a user and assign him to the administrators group using two unauthorized requests to the system."
The attack is also possible on systems that are protected by two-factor authentication systems that use both a secret key and password, he added. ERPscan is making a tool that can detect the problem available at no charge.
"SAP is working closely with Alexander Polyakov on this issue," SAP spokesman Andy Kendzie said in a statement Friday. "SAP will deliver a patch to its customers shortly."
The patch will come as part of a regular security update, and not an out-of-cycle emergency fix, he added.
The news comes shortly after Oracle's release of Java SE 7. The language update shipped with bugs that Oracle engineers knew about prior to the release, a move met with serious consternation from some critics. Oracle plans to fix the bug in an update.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Android becomes second most popular malware



The first quarter was the most active in malware history and mobile attacks are moving to the forefront, according to McAfee data. Android attacks are also picking up. McAfee’s first quarter threat report noted that attacks surged in the first quarter, but spam has fallen. In fact, there were 6 million unique malware samples in the first quarter, the highest ever for the first three months of the year. February had the most new malware samples—2.75 million. Fake anti-virus software—think Mac Defender—reached its highest levels in march with 350,000 unique samples. As for emerging threats, McAfee noted that Android devices are becoming malware havens. Android was the second most popular environment for mobile malware behind Symbian in the first quarter. Historically, Android remains No. 3.

McAfee Labs combats several developing families of malware that attack Android phones. One of the families, Android/DrdDream, comprises a variety of legitimate games and apps that have been injected with malicious code. These threats are unique and quite dangerous due to the use of two root exploits to gain greater control of those phones. The two exploits—Exploit/LVedu and Exploit/DiutesEx—were initially used by users trying to gain legitimate root access to their own devices, a process commonly referred to as rooting.1 In the PC world, malware often uses exploits to enable drive-by downloads that infect machines visiting specially designed or compromised websites. For mobile devices, much of the malware has required user interaction, but in the near future mobile exploits will certainly allow automatic malware installation. Like Android/DrdDream, the Android/Drad family is made up of maliciously modified applications.
This family sends device information to an attacker-controlled site. Just like in the PC malware world, Android/Drad listens for commands from the attacker. The malware can also download additional software, though it stops short of being a full-fledged mobile botnet. It appears that the malware uses blackhat search-engine optimization techniques, a process of manipulating search engine results to place dangerous sites higher than they should appear in lists of hits.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

BackTrack 5 R3 (Penetration Testing Distribution) Will be Available on August 13th, 2012

BackTrack 5 R3 (Penetration Testing Distribution) Will be Available on August 13th, 2012

Earlier we have discussed several times about BackTrack. After the huge success BackTrack 5 R2, now the world's most popular and widely used penetration testing distribution BackTrack is set to release its third release candidate (R3) of BT 5. According to the official release The BackTrack Development team will be releasing an R3 revision of their Penetration Testing distribution in 2 weeks. This release focuses on bugfixes and over 50 new tool additions – making it the most potent revision yet. Though the BT5 R3 preview has already been released in BlackHat 2012 Las Vegas for the enjoyment of conference attendees, which can be found in their delegate bags.  The DVD contains a BT5 R3 Gnome, 32 bit edition – burnt as an ISO (as opposed to an image). The BackTrack Development team will be taking in their last bug reports and tool suggestions from the BH / Defcon crowds for the upcoming official release, which will be on August 13th, 2012We would also like to give to reminder that the first release candidate (R1) of BackTrack 5 was released in August last year. Current BT5 users can simply upgrade to the latest release using the regular update commands. More details will be released along with the full listing of new tools on the 13th of August. 







SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Teamgreyhat Official Forum Hacked


Official Forum of one of the most popular hackers group named Teamgreyhat get hacked. A hacker named Hunt has hacked into the TGH's web-server and deface the index page. Also the hacker has claimed that he has breached all the data from that particular server. Since 2011 Teamgreyhat has became very popular form for hackers and also TGH is regarded as one of the most dangerous blackhat team as because if you dig the history you will find that TGH has rooted many web-servers and hacked millions of sites. Their last breach on Ankit Fadia's server gave them more popularity. But this hack will surely make a negative impact of TGH's reputation. The hacker also created deface mirror on the Arab-zone.

Teamgreyhat Reaction:- 
After this hack Teamgreyhat authority instantly released their statement. And in that they have clearly ignored the phenomena by saying Hunt (One Who Hacked The TGH Forum) belongs to TGH core team and he has full privilege on their server. In short he was maintaining that web-server. So a Admin can easily damage his own system. Also they have clearly stated that this is an internal attack. The hacker knew all the passwords and by which he logged into the system and changed the index page. To see the full press release of TGH click Here.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

BackTrack 5 R1 Will be Available on 10th of August,2011

 
After the huge success of BT 5 now Famous Security Distribution Back Track Linux will decide to release BackTrack 5 R1 on the 10th of August,2011. This will complete the first 3 month cycle since the last release. With over 100 bug fixes, numerous package updates and the addition of over 30 new tools and scripts – BackTrack 5 R1 will rock. We will have a pre-release event of BackTrack 5 R1 at the BlackHat  / Defcon Conference  a few days earlier. 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...