2011年9月29日 星期四

有關悠遊卡事件一些誤會的澄清 [轉貼]

關於悠遊卡事件,最近網路上出現很多嘴砲老師,
像是陳X成老師硬說他好像HIT的工作人員...
>_< 老天爺壓,這傢伙哪來的壓....他應該也沒來參加過HIT (剛過教師節,要忍住不能說不雅的話)
 http://www.chen0001.idv.tw/ 
推薦陳老師上一下"關鍵時刻"...

--- [HIT關方說明]
有關悠遊卡事件一些誤會的澄清 悠遊卡事件到目前為止,在網路上或新聞中,代表駭客年會發言的人幾乎都不是我們的成員,錯誤消息很多,為了避免大眾對駭客年會有錯誤的認知和誤解,我們希望利用這篇公告來跟大家澄清。
  http://blog.hitcon.org/2011/09/blog-post.html [更多內容]

2011年9月28日 星期三

我們的成員 Anthony 將在 10月 OpenGroup 研討會上發表 Xecure Lab 在 APT相關研究

我們的成員 Anthony 將在今年10月25號台北的 OpenGroup 研討會上發表 Xecure Lab 在 APT 相關研究。
下半年還有幾場研討會,陸續地我們還會發表 APT 相關的一些研究,敬請期待~~

Advanced Persistent Threat (APT) DNA Clustering and Defense "Kungfu"

Tuesday, October 25, 2:30 - 3:00


http://www3.opengroup.org/taipei2011/presentation-details



Advanced Persistent Threat (APT) (a.k.a. Targeted Attacks from Cyber Taskforces) may not be identified in the wild but target specific a organization and company like incidents from RSA, Lockheed Martin, and Mitsubishi Heavy Industry. This entire new class of threat could not be dealt with traditional virus detection and IDS/IPS.
We will share our research on clustering APT samples in various task forces in Asia and demonstrate the tools called APT Deezer and the tool of email with APT document attachement detection for enterprise defense.
Anthony Lai specialized in penetration test, code audit, crime investigation and threat analysis. He founded VXRL (Valkyrie-X Security Research Group, http://www.vxrl.org) after attending to DEFCON 15, connecting to and learning from world hackers and security researchers.
Anthony has formed Xecure Lab (http://www.xecure-lab.com) with Birdman and Benson from Taiwan. He undertook APT and threat research and provided corresponding enterprise defense and service. Anthony has spoken at Blackhat USA 2010, DEFCON 18 and DEFCON 19 and Hack In Taiwan 2010 and 2011 and been certified with SANS GREM Gold, GCFA and GWAPT certifications.