Thursday, 21 February 2013

ALL road leads to Nullcon International Security Conference, Goa ~ 27th Feb - 2nd March, 2013

“Nullcon’s 5th International Security Conference”, on 27th Feb - 2 March 2013 @ Bogmallo Beach Resort, Goa (

Nullcon security conference is well known for its speakers and talks where new vulnerabilities , risks and attacks on systems are responsibly disclosed along with their prevention mechanisms.

The conference ensures of a great learning experience and networking.The conference is attended by the whos who in the security industry and includes various events targeted at different kind of audience from techies to business executives:

Keynote Talks

1. Richard Thieme - Staring into the Abyss

2. Janardhana Swamy (M.P. Karnataka - Lok Sabha) - Security & Politics

Talks @nullcon Goa '13

     SamuraiSTFU - Smartgrid Testing Framework for Utilities by Justin Searle
    Vulnerability elimination by force of a new device platform by Yury Chemerkin
    Hardware Backdooring is Practical by Jonathan Brossard
     BYOD - How will it shape your wireless network security infrastructure by Kiran Deshpande
    SMS to meterpreter: Fuzzing USB modems by Rahul Sasi
    HTML 5 –Attack and Defense by Ksenia Dmitrieva
     Mozilla Bug Bounty Program - Crowd Sourcing Vulnerability Research by Raymond Forbes
    Mobile Code, Mining For Discovery & Exploits by Hemil Shah

Trainings @nullcon Goa '13

1. Penetration Testing SmartGrid & SCADA by Justin Searle *New

2. Xtreme Android Hacking by Aseem Jakhar *New

3. Reverse Engineering and Malware Analysis by Abhishek Datta

4. Xtreme Exploitation by Omair

5. Mobile Application Hacking:- Attack & Defense by Hemil Shah

6. Xtreme Web Hacking by Akash Mahajan & Riyaz Walikar

7. Cyber Warfare Intelligence and Intrusion Operations by Atul Agarwal *New

Why Should You Attend ?

    Expert Sharing Knowledge Platform
    Secure your organization
    Showcase your company
    Recruit & get Hired
    Networking & built long term relations
    Niche Community Members

Job Fair

nullcon is excited to host a special job fair organized for security professionalsand organizations. Nullcon job fair gives you open access to meet the heads of various security organizations, understand their requirements and offer them your competencies in return. It is an excellent opportunity for organizations to hire the best talent in information security industry and for security professionals to find better job prospects.
nullcon job fair is a platform where prospective employer and employee can meet and interact with each other in an open environment.


Budget constraints, participants can also opt for Economy Pass (Without Lunch) @INR4999

For those who couldnt attend we will have a replica of this here in Nigeria feel free to contact me for the details.

Apple employees' computers Hacked !!!

Apple has announced that they were targeted by hackers who infected small amount of employees' computers .

The security breach occurred when employees visited a developer website that exploited a vulnerability in the Java browser plug-in, installing malware on their Mac computers.

Few days back, we reported that Facebook employees'computers infected after they visit a malicious page that exploits the java vulnerability and serves malware.

BurgerKing site hacked!!! site defaces!!!
An unknown hacker breached the Twitter account of fast-food chain Burger King and announced the company had been “bought out” by McDonald’s.

The @BurgerKing account name was changed today to "McDonalds" and changed the logo with McDonalds Logo with a message "Just got sold to McDonalds because the whopper flopped =FreeDom is Failure""

“We just got sold to McDonalds! Look for McDonalds in a hood near you,” the hacker tweeted from the hacked account.

According to report, the account was suspended by Twitter after the hack. The hack was announced by the Infamous Anonymous Twitter account "@YourAnonNews". But we are not sure who hacked the account.

 At the time of writing, the hacked account is back to online but the tweets are protected.

The hacker defaced the website ( and leaked the compromised data in the defacement page itself. Mirror of the defacement:

The hacker leaked only part of the database which consists of Full Naame, mobile number, email address, course details and other details.
In an email sent to a security community the hacker provided 6 Spreadsheets :  brbraitt_users,     Business_contacts, Courses, Faculty_Presentations,Training_Contact, projects.

'brbraitt_users.xlsx' file contains the email ids, passwords, name and addresses, ,mobile number. It includes the email id and passwords of Admin.

At the time of writing, the website still shows the defacement page.