•  

Sessions at SXSW Interactive 2012 about Security on Saturday 10th March

View as grid

Your current filters are…

Clear
  • Securing Your Data in a Target-Rich Environment

    by Darren Kitchen

    Each year, thousands of technophiles descend upon Austin, bringing Internet-connected laptops, phones and tablets with them, and most of them think very little about keeping their personal communications secure. Open wireless networks in the convention center – and in hotels, bars and coffee shops – offer a convenient way to keep in touch with home, but also leave any data that is transmitted over those networks open to snooping by malicious individuals. In this session, host of Revision3 podcast Hak.5 and regular contributor on the TWiT network, Darren Kitchen, will walk attendees through live demonstrations of many ways in which their personal data are vulnerable while connected to the Internet at SXSW, and the steps they can take to keep that data private and safe. The tips and information from this session will benefit those who attend not only while they are at SXSW, but any time they sit down at their own local coffee shop and open up their laptop to fire off some email.

    At 11:00am to 12:00pm, Saturday 10th March

    In Citadel, Driskill Hotel

    Coverage audio clip

  • Securing the Cloud: What's Your Cloud Entry Point?

    by Wade Holmes

    The move to cloud computing is still froth with questions about the confidentiality, integrity and availability of data moved to the cloud. These questions, and their answers, differ depending on the cloud entry point chosen by the end-user. Potential cloud entry points include Infrastructure-as-a-Service, Platform-as-a-Service, or Software-as-a-Service (IaaS, PaaS, or SaaS) cloud computing solutions. This presentation will review the current state of affairs around cloud computing security, and delve into security considerations end-users should make for each of the differing cloud solution entry points. This session is part of the Big Data Track is sponsored by Gemalto.

    At 3:30pm to 4:30pm, Saturday 10th March

    In Salon FG, Hilton Austin Downtown

    Coverage audio clip

  • The Dark Side of Social Networks: Malware & Fraud

    by Paul Judge

    The popularity of Twitter and Facebook make them attractive targets for attackers. The viral features and open APIs make it an efficient medium for attackers. In this talk, we discuss the scale and history of malicious activity on Twitter and Facebook. Based on a comprehensive research study, we demonstrate how attackers respond rapidly to the large increases of users driven by celebrity attention. We highlight popular attack techniques across trending topics, URL shorteners, fake accounts, photo tagging, and fake apps. We show how malware has been designed to steal social network credentials and use them to carry out automated attacks. In order to safeguard the future and usefulness of these platforms, the community and industry must combat these threats and control this malicious activity. We explore ways to safeguard individual users and brands. We also suggest approaches that social network providers should take to improve the security of their networks. This session is part of the Big Data Track sponsored by Gemalto.

    At 5:00pm to 6:00pm, Saturday 10th March

    In Salon FG, Hilton Austin Downtown