Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced that Tomer Teller and Kellman Meghu will present sessions at Black Hat USA, which takes place from August 2-7, 2014 at Mandalay Bay in Las Vegas, NV; and Shahar Tal will present a session at DEF CON 22, which takes place on August 7-10, 2014 at The Rio Hotel & Casino in Las Vegas, NV.
Check Point @ Black Hat USA
Visit Check Point in booth #553, Business Hall, Shoreline A, Mandalay Bay, Las Vegas
WHAT: Automated Memory Analysis, Presented by Tomer Teller, Security Innovation Research Manager:This session will introduce an open-source malware memory analysis utility that can be easily integrated into existing automated systems, discussing how to leverage existing plugins and combine them with other utilities and techniques in order to make powerful in-memory “behavioral combinations”. Additionally, this presentation will provide insight into when analysts should and should not use the three different types of analysis: static, dynamic and memory.
WHEN: Thursday, August 7, 2014 from 10:00 AM to 12:30 PM
WHERE: Shoreline B, Mandalay Bay, Las Vegas
WHAT: Weaponized Security, Presented by Kellman Meghu, Head of Security Engineering Central US and Canada: This talk discusses how a tool to secure people can be turned against them, and the results of random people, leaking data about their computers and themselves, harvested to build profiles and assumptions about who they are. This is all done with publicly available enterprise security tools, implemented in uncommon ways. Caution: This presentation contains unfiltered data and may be offensive in content and language.
WHEN: Thursday, August 7, 2014 from 3:30 to 4:30 PM
WHERE: Business Hall — Theater B, Mandalay Bay, Las Vegas
Check Point @ DEF CON 22
WHAT: I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Presented by Shahar Tal, Vulnerability Research Team Leader: This presentation shines a bright light on TR-069/CWMP, a previously under-researched, de-facto CPE device management protocol, and specifically targets ACS (Auto Configuration Server) software, whose hostile takeover could have devastating effects on critical amounts of users. We investigate several TR-069 ACS platforms, and demonstrate multiple instances of poorly secured deployments, where we could have gained control over hundreds of thousands of devices.
WHEN: Saturday, August 9, 2014 from 11:00 AM to 12:00 PM
WHERE: Track Three – The Rio Hotel & Casino, Las Vegas
Follow Check Point via