Each year, thousands of technophiles descend upon Austin, bringing Internet-connected laptops, phones and tablets with them, and most of them think very little about keeping their personal communications secure. Open wireless networks in the convention center – and in hotels, bars and coffee shops – offer a convenient way to keep in touch with home, but also leave any data that is transmitted over those networks open to snooping by malicious individuals. In this session, host of Revision3 podcast Hak.5 and regular contributor on the TWiT network, Darren Kitchen, will walk attendees through live demonstrations of many ways in which their personal data are vulnerable while connected to the Internet at SXSW, and the steps they can take to keep that data private and safe. The tips and information from this session will benefit those who attend not only while they are at SXSW, but any time they sit down at their own local coffee shop and open up their laptop to fire off some email.
by Wade Holmes
The move to cloud computing is still froth with questions about the confidentiality, integrity and availability of data moved to the cloud. These questions, and their answers, differ depending on the cloud entry point chosen by the end-user. Potential cloud entry points include Infrastructure-as-a-Service, Platform-as-a-Service, or Software-as-a-Service (IaaS, PaaS, or SaaS) cloud computing solutions. This presentation will review the current state of affairs around cloud computing security, and delve into security considerations end-users should make for each of the differing cloud solution entry points. This session is part of the Big Data Track is sponsored by Gemalto.
by Paul Judge
The popularity of Twitter and Facebook make them attractive targets for attackers. The viral features and open APIs make it an efficient medium for attackers. In this talk, we discuss the scale and history of malicious activity on Twitter and Facebook. Based on a comprehensive research study, we demonstrate how attackers respond rapidly to the large increases of users driven by celebrity attention. We highlight popular attack techniques across trending topics, URL shorteners, fake accounts, photo tagging, and fake apps. We show how malware has been designed to steal social network credentials and use them to carry out automated attacks. In order to safeguard the future and usefulness of these platforms, the community and industry must combat these threats and control this malicious activity. We explore ways to safeguard individual users and brands. We also suggest approaches that social network providers should take to improve the security of their networks. This session is part of the Big Data Track sponsored by Gemalto.
9th–13th March 2012