11.29.2008

Fim das Férias

Estamos devendo a edição 60 do Podcast. O período pré e pós YSTS 2.0 foi bastante intenso e ainda não conseguimos conciliar uma agenda para gravarmos, mas podem ter certeza que estamos preocupados com isso e nos empenhando para gravar o quanto antes.
Enquanto isso, voces podem se divertir com algumas coisas:

Fotos do YSTS 2.0
Fotos da Festa do YSTS 2.0

Recordar é viver, vejam também:

Videos das palestras do YSTS 1.0
Video das fotos do YSTS 1.0 (avi e m4v)

Pérolas e erros de Gravação do I Sh0t the Sheriff, clips 1 e 2.

8.24.2008

Edição 56 - 24.08.08












46 minutos

Eventos


ToorCon 2008 CfP
August 4th, 2008 - Call for papers released
August 22nd, 2008 - First round of selection announced
August 29th, 2008 - Call for papers closes
September 5th, 2008 - Speaker & sponsor selection finalized
September 24th, 2008 - ToorCon training workshops start
September 26th, 2008 - ToorCon seminars & conference reception
September 27th, 2008 - ToorCon conference 50-minute talks
September 28th, 2008 - ToorCon conference 20-minute talks


IT Security Conference 2008, UK



Notícias


Introducing Keyczar



Understanding the Web browser threat:
Examination of vulnerable online Web browser populations and the "insecurity iceberg"



Judge lifts MIT students' card-hacking gag order



Spam and Malware Ecosystem Targeting Brazilian Users with YouTube and Adobe Flash Themes


First-Ever Photo Tour of Defcon's Network Center



Delta Air Lines terá Internet sem fio em vôos


Georgia Cyberwar Overblown




Baixe o mp3 diretamente daqui.

8.20.2008

Todos os videos do You Sh0t the Sheriff 1.0

Finalmente todos os videos do YSTS 1.0 estão no ar. A maioria das palestras em PDF tambem.

Divirtam-se.

Abertura do Luiz Eduardo
Video Palestra

Nick Farr - Building the Global Hacker Community
Video Palestra

Augusto P. de Barros - Detecção de ameaças internas: Alternativas, tendências e novidades
Video Palestra

Luis Miras - Reverse engineering analysis of various vulnerabilities
Video Palestra

Eduardo Neves - Sobrevivendo no Mercado: As Carreiras em Segurança da Informação
Video Palestra

Rodrigo R. Branco - KIDS - Kernel Intrusion Detection System
Video Palestra

Mike Reavey - MSRC’s historical perspective on security ecosystem
Video

Adriano Cansian - Forjando o código: Desafios e progressos da formação profissional em segurança
Video Palestra

Felix "FX" Lindner - iPhone vs. Windows Mobile vs. BlackBerry vs. Symbian
Video (probleminhas com o Google Video. Estamos verificando)

Eldon Sprickerhoff - Attacks of Nortel VoIP Implementations
Video Palestra

Emmanuel Goldstein
Video (probleminhas com o Google Video. Estamos verificando)

8.12.2008

Edição 55 - 12.08.08











Edição especial Blackhat 2008 & DefCon 16

Billy, Nelson e Luiz se encontram em Las Vegas e falam dos eventos da semana.

Atualização: DefCon teve mais de 9000 pessoas

Baixe o mp3 diretamente daqui.

5.04.2008

Edição 50 - 04.05.2008


powered by ODEO

1 hora e 3 minutos

Eventos


IMF 2008
4th International Conference on
IT Incident Management & IT Forensics
http://www.gi-ev.de/fachbereiche/sicherheit/fg/sidar/imf/imf2008/index.html


T2´08 conference,
http://www.t2.fi/


Kiwicon - New Zealand's Hacker Con
http://www.kiwicon.org/


Index of /hitbsecconf2008dubai/materials
http://conference.hitb.org/hitbsecconf2008dubai/materials/


DefCon contest has vendors worried
http://www.thetechherald.com/article.php/200818/842/DefCon-contest-has-vendors-worried
e
http://www.informationweek.com/blog/main/archives/2008/04/will_code_virus.html


Notícias


Bancos online não prestarão suporte a usuários de PCs inseguros
http://computerworld.uol.com.br/seguranca/2008/04/18/bancos-online-nao-prestarao-suporte-a-usuarios-de-pcs-inseguros/


Juiz solta piratas virtuais, mas exige que leiam obras clássicas
http://www1.folha.uol.com.br/folha/informatica/ult124u394778.shtml


Automatic Patch-Based Exploit Generation
http://techbuddha.wordpress.com/2008/04/24/automatic-patch-based-exploit-generation/


Computer hacker testifies against News corp
http://www.reuters.com/article/blogBurst/technology?type=technologyNews&w1=B7ovpm21IaDoL40ZFnNfGe&w2=B8jR2GIu7TLKBj1N4Ufg5Sg&src=blogBurst_technologyNews&bbPostId=B1ZjqRi8apHfCz9bslrPLhVeFB7kC6bxL7Lk3BzeKtP35nPsd&bbParentWidgetId=B8jR2GIu7TLKBj1N4Ufg5Sg


Bluetooth surveillance secretly tested in the city of Bath
http://arxivblog.com/?p=376


Segurança em TI: profissionais jovens dificultam trabalho de CIOs
http://www.convergenciadigital.com.br/cgi/cgilua.exe/sys/start.htm?infoid=13570&sid=46

Baixe o mp3 diretamente daqui.

4.22.2008

Edição 49 - 21.04.2008


powered by ODEO

Uma hora e um minuto de duracao

Eventos
-------

SyScan'08 Singapore - Call for Paper
http://www.syscan.org/sg/indexsg.html

Phrack 65
http://www.phrack.org/




Notícias
--------

The Top 100 Alternative Search Engines
http://www.readwriteweb.com/archives/top_100_alternative_search_engines.php


Open Source Computer Emergency Response Team
http://www.ocert.org/


MetaGoofil - Metadata analyzer, information gathering tool
http://www.edge-security.com/metagoofil.php


THC is sharing their thoughts on a blog starting from TODAY.
http://blog.thc.org


Woman 4 Times More Likely Than Men To Give Passwords For Chocolate
http://www.eskenzipr.com/page.cfm/T=m/Action=Press/PressID=202

Entrevista com Convidado Especial: Marcos Machado

Baixe o mp3 diretamente daqui.

4.13.2008

Edição 48 - 13.04.2008


powered by ODEO


1 hora e SEIS minutos

Eventos
---

Shakacon 2008
http://www.shakacon.org/


POC2008 - Power of Community
http://www.powerofcommunity.net/home.html


ICCYber
http://www.iccyber.org/2008/portugues/index.html





Notícias
--------

Adobe claims it knew of 'Pwn to Own' bug
http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=security&articleId=9074719


GOOGLE CONFIRMA CRIAÇÃO DE FERRAMENTA PARA A PF NO ORKUT
http://g1.globo.com/Noticias/Tecnologia/0,,AA1368793-6174,00.html


Google calendar as a spam platform
http://blogs.securiteam.com/index.php/archives/1078
http://lifehacker.com/377925/keep-spammers-out-of-your-google-calendar


Computer viruses hit one million
http://news.bbc.co.uk/2/hi/technology/7340315.stm


Network Solutions Hijacking Unassigned Sub-Domains
http://www.techcrunch.com/2008/04/08/network-solutions-hijacking-unassigned-sub-domains/


Firewall obsolescence
http://www.networkworld.com/community/node/26138


Os norte-americanos irão receber mensagens de texto SMS em caso de emergência
http://www.alexandreatheniense.com.br/2008/04/os-norte-americ.html

Baixe o mp3 diretamente daqui.

3.31.2008

Edição 47 - 30.03.08


powered by ODEO

1 hora e 23 minutos


Eventos
---

Hacker Space Fest
http://www.tmplab.org/wiki/index.php/Hacker_Space_Fest


ToorCon Seatle
http://seattle.toorcon.org/


PH-Neutral
http://ph-neutral.org/


Segurança Digital - Portugal
http://www.segurancadigital.org/?q=node/17


SHARKFEST
http://www.cacetech.com/SHARKFEST.08/



Notícias
--------

Abandon Ship! Data Loss Ahoy!
http://attrition.org/security/rant/z/rapid7.html


Trote pela Internet faz homem perder quase todos os seus bens
http://www.alexandreatheniense.com.br/2008/03/trote-pela-inte.html


Sony Officially Apologizes for the PS3 Vulnerability and Network Hack
http://www.akihabaranews.com/en/news_details.php?id=15744


Outsourced passports netting govt. profits, risking national security
http://www.washingtontimes.com/apps/pbcs.dll/article?AID=/20080326/NATION/840186493/1001


---


Review da CanSecWest



Baixe o mp3 diretamente daqui.

3.16.2008

Edição 46 - 16.03.2008


powered by ODEO

1 hora e cinco minutos


Eventos


Troopers 08


SBSeg´08

BlackHat CFP aberto

Notícias do BlackBerry



BlackBerry-based SCADA puts plant control in your hands
http://www.drives.co.uk/fullstory.asp?id=2232


Don't forget to secure your BlackBerry, companies told
http://software.silicon.com/security/0,39024655,39170322,00.htm


BlackBerry servers ripe for the hacking
http://www.techworld.com/security/news/index.cfm?newsID=11663


Indian Blackberry network to be shut down unless RIM allows government snooping
http://www.engadget.com/2008/03/12/indian-blackberry-network-to-be-shut-down-unless-rim-allows-gove/



CIAB 2008: Inovação é marca das soluções de Segurança bancária

http://www.convergenciadigital.com.br/cgi/cgilua.exe/sys/start.htm?infoid=12774&sid=16

Baixe o mp3 diretamente daqui.

3.09.2008

Edição 45 - 09.03.2008


powered by ODEO

1 hora e quase nove minutos

Eventos

Chamada de apresentações para a Reunião GTS-11.
-------
GTER - Grupo de Trabalho de Engenharia e Operação de Redes - 25ª Reunião
GTS - Grupo de Trabalho em Segurança de Redes - 11ª Reunião
Salvador - 31 de Maio e 1 de Junho de 2008

http://gter.nic.br/
http://gts.nic.br/

---

Call for Papers: First IEEE International
Workitorial on Steganography - "Vision of the Unseen"

http://www.liv.ic.unicamp.br/wvu/

in Anchorage, Alaska on June 23rd


---

RUXCON 2008 CALL FOR PAPERS
RuxCon would like to announce the call for papers for the fifth annual
RuxCon conference.


---
Sector - Call for Speaker

October 7-8, 2008
MTCC, Toronto, ON, Canada

---

Toorcon Seattle - April 18th-20th

CFP opened


---

DefCon CPF
Call for Papers Opens March 1st!


---

ekoparty 4th edition
Information Security/Insecurity Conference.
October 2 and 3, 2008
Argentina - Ciudad Autonoma de Buenos Aires


---

WOOT '08 Call for Papers

2nd USENIX Workshop on Offensive Technologies (WOOT '08)
July 28, 2008
San Jose, CA


---


Materiais ucon disponiveis





Notícias



State of the wireless security
http://it.slashdot.org/article.pl?sid=08/02/17/1628210&from=rss
http://www.codenomicon.com/resources/whitepapers/Codenomicon_Wireless_WP_v1_0.pdf

Blog do Gustavo Bittencount

---

Ukrainian Hacker Makes a Killing in Stock Market Fraud
http://blog.wired.com/27bstroke6/2008/02/ukrainian-hacke.html

Pesquisa aponta futuro do crime online no mundo
http://www.alexandreatheniense.com.br/2008/02/pesquisa-aponta.html


Gmail captcha
http://www.websense.com/securitylabs/blog/blog.php?BlogID=174


Google as hacking tools
http://www.goolag.org/
http://www.gnucitizen.org/ghdb/application.htm



Estatísticas de invasões 2007 - Zone-H


Chinese backdoors "hidden in router firmware"



Assunto 1
DNS Inventor Warns of Next Big Threat



Assunto 2

Shmoocon 2008


Baixe o mp3 diretamente daqui.

2.12.2008

Edição 44 - 11.02.08


powered by ODEO

1 hora e 7 minutos e alguns segundos

Eventos

Black Hat USA 2008 CFP Now Open


SMi’s Cyber Defence Conference

EVT '08 Call for Papers



Notícias


SSA - Security System Analyzer
Based on OVAL framework, Open Vulnerability and Assessment Language


SandBox Information Center


PICO E08 RFID Security 2.5" HDD enclosure


Sadly, the PIX Firewall is Discontinued…


Ameaça a conectividade Internet Global


Hacking Video Surveillance Networks


Assunto 1


Stop this, stop that, ENOUGH!


Assunto 2

Mais paranoia:

Couple banned for life from shopping centre and branded 'terrorists' - for taking photos of their grandchildren

e

Viajantes têm laptops revistados em aeroportos dos EUA

Baixe o mp3 diretamente daqui.

1.03.2008

Edição 41 - 02.01.08


powered by ODEO

Duração: 66 minutos :)


Eventos


BlackHat
Várias coisas sobre a Blackhat em 2008, incluindo um tal local secreto. Que local secreto é esse?
Além disso, CFP aberto
https://cfp.blackhat.com/

D.C. 2008 Briefings CfP closes January 4
Europe 2008 Briefings CfP closes February 1
USA 2008 Briefings CfP will open February 1
Japan 2008 Briefings CfP will open May 1


SecTor 2007
Apresentações e vídeos disponíveis
http://sector.ca/presentations/


Ekoparty 2007
Apresentações disponíveis
http://www.ekoparty.com.ar/cronograma-eng.html


Videos da HitB Malasia disponíveis
http://video.hitb.org/2007.html

e apresentação do Luiz Eduardo aqui.


1st CALL FOR PAPERS. - CISIS'08
International Workshop on
Computational Intelligence in Security for Information Systems (CISIS'08)
http://www.cisis2008.org/home/home.shtml

uCon
Em 9 de fevereiro vai acontecer a primeira uCon, conferência de
segurança da informação, hacking e tecnologia realizada em Recife, PE.
A conferência não tem fins lucrativos, não terá palestras de empresas
tentando vender produtos e a entrada é gratuita.
Call for participation: http://ucon.thebugmagazine.org/cfp.php


ACNS 2008: CALL FOR PAPERS
6th International Conference on
Applied Cryptography and Network Security
Location: Columbia University, New York City, USA
Date: June 3-6, 2008
Submission Deadline: 14 January 2008 23:59:59 EST
Author Notification: 14 March 2008
http://acns2008.cs.columbia.edu/


ClubHack2007: Presentation are online now
http://clubhack.com/2007/presentations.html


Novos vídeos do CGI.br


Video: Theory and Practice of Cryptography
http://www.youtube.com/watch?v=KDvt_0cafPw


2008 IEEE 11th International Conference on Computational Science and Engineering
Track: Security, Privacy and Trust
CSE 2008
http://www.icmc.usp.br/cse08

July 16-18, 2008 - Sao Paulo - Brazil
Important Dates
Paper submission due: January 25, 2008
Paper notification of acceptance: March 21, 2008
Final camera ready: April 25, 2008
Paper submission web site http://cse.stfx.ca/~cse08/sub/

*SyScan’08 HONG KONG*
To address the increasing importance of information security in Hong Kong, SyScan will be going to Hong Kong in 2008.
SyScan’08 Hong Kong will provide an opportunity for foreign security specialists to be exposed to the Hong Kong security community and collaborate on practical solutions to computer security issues.

Date: May 29th – 30th, 2008.
Venue: To be determined.

*SyScan’08 SINGAPORE*
Date: July 3rd – 4th, 2008.
Venue: Novotel Clarke Quay Singapore.


*IMPORTANT DATES*
*Hong Kong*
Final CFP Submission – 29th February 2008
Notification of Acceptance – 30th March 2008.
Final Submission for Accepted Presentation Material (Speakers) – 15th April 2008

*Singapore*
Final CFP Submission – 30th April 2008
Notification of Acceptance – 30th May 2008.
Final Submission for Accepted Presentation Material (Speakers) – 15th June 2008



Notícias


Mini bug do milênio


Google develops Wikipedia rival


Tiger Team: New TV series about pen testers


Russia launches final satellites for its own GPS


Welcome to the new Microsoft Security Vulnerability Research and Defense blog!


Assunto 1
1 ano de IStS, retrospectiva 2007 e planos de conquista do mundo em 2008



Assunto 2

Revisão da 24c3

Baixe o mp3 diretamente daqui.