Security News

Forwarded from: d.lin (at) icitst.org Apologies for cross-postings! Kindly email this Call for Papers to your colleagues, faculty members and postgraduate students. CALL FOR PAPERS...

http://arstechnica.com/security/2013/07/for-first-time-ever-feds-asked-to-sit-out-defcon-hacker-conference/ By Dan Goodin Ars Technica July 11, 2013
![THOTCON 0x4 - Chicago's Hacking Conference - Call For Papers [CFP]](/static/build/img/news/alt/cyberattack-stats-small.jpg)
http://thotcon.org/cfp.html What: THOTCON 0x4 - Chicago's Hacking Conference When: 04.26.13 Where: TOP_SECRET Call for Papers: Opens 10.01.12 *** ABOUT...

Forwarded from: Francisco Moyano ** APOLOGIES FOR CROSS POSTINGS** IFIPTM 2013- Call for Papers  7th IFIP International Conference on Trust Management Málaga, Spain 3-5 June 2013...

http://www.wired.com/threatlevel/2012/05/mi6-codebreaker-at-blackhat/ By Kim Zetter Threat Level Wired.com May 3, 2012

http://news.techworld.com/security/3342661/how-anonymous-gatecrashed-fbi-soca-conference-call/ By Jeremy Kirk Techworld.com 07 March 2012

http://www.csoonline.com/article/701040/how-to-sneak-into-a-security-conference By Joan Goodchild Senior Editor CSO February 28, 2012

Forwarded from: Attila Bartfai World of Ethical Hackers Revs Up -- Hacktivity 2011
![[ACM CCS'11]: Pre-Conference and Post-Conference Workshops](/static/build/img/news/alt/cybersecurity-attacker-small.jpg)
Forwarded from: ACM CCS 2011 Apologies for multiple copies of this announcement. ------------------------------------------------------ PRE-CONFERENCE WORKSHOPS (October 17, 2011)...

http://www.theinquirer.net/inquirer/news/2045528/hundreds-log-rogue-wireless-hotspot-infosec-conference By Asavin Wattanajantra The Inquirer April 21, 2011 HUNDREDS OF PEOPLE attending London's...