Saturday, 19 November 2016

Hack In Paris: Registration open

The  Seventh Edition of Europe's leading I.T security Congress,  Hack In Paris is scheduled to be held from June 19, 2017 to June 23, 2017 in DinseyLand.

Confernce will focus on  topics related to Internet of Things (IoT), Modern reverse engineering, Vulnerability research and exploitation, Penetration testing and security assessment, Malware analysis and new trends in malicious codes, Forensics, IT crime & law enforcement, Privacy issues: LOPPSI, HADOPI, Low-level hacking (console security & mobile devices), Risk management and ISO 27001, BYOD, Social Engineering, but don't hesitate to submit your research paper if your topic of research is not in the list.

They have opened registration for  speakers and trainers  to share their experience. The time limit for the speaker is 45min + 10min of Q&A, you can fill and send it to cfp@hackinparis.com. All submissions will be reviewed by the  program committee. Authors will be notified of acceptance of their talk.

 For registration details please visit the website (https://hackinparis.com/).  The last date for submitting the application is  March 6th, 2017.


Here  is the whole schedule of the program:
* November 16th - CFP/CFT announced
* March 6th - Submission deadline
* March 13th - Booking opening
* March 26th - Talks & Trainings program announcement
* June 19th to 23rd - Hack In Paris
* June 24th to 25th - Nuit Du Hack

The 6th edition of Hack In Paris was held in France, at la Maison De la Chimie, Paris, and was attended by more than 400 attendees around the world.

Hack In Paris attendees aims to discover the realities of hacking, and its consequences for companies. The program includes state of the art IT security, industrial espionage, penetration testing, physical security, forensics, malware analysis techniques and countermeasures.
Mobile Chipset Qualcomm and HackerOne Partner on Bounty Program by Tom Spring November 18, 2016 , 12:45 pm Qualcomm kicked off its first bug bounty program Thursday, opening the door for white hat hackers to find flaws in a dozen Snapdragon mobile chipsets and related software. Rewards for the invite-only bug bounty program top $15,000 each. HackerOne will facilitate Qualcomm’s bounty program; the chipmaker is hoping to secure millions of smartphones running Snapdragon silicon, including phones sold by Samsung, LG, HTC and Google. Related Posts Army Bug Bounty Building New Relationships with Hackers November 14, 2016 , 12:03 pm Google Releases Supplemental Patch for Dirty Cow Vulnerability November 8, 2016 , 1:38 pm GitLab Patches Command Execution Vulnerability November 3, 2016 , 2:50 pm Eligible Snapdragon products include eight mobile processors, four LTE modems and additional related silicon technologies and software. The bug bounty program will be administered through the Qualcomm Technologies business unit in conjunction with HackerOne. The program, Qualcomm claims, is the first of its kind for a major silicon vendor. “With Qualcomm Technologies’ vulnerability rewards program they will continue to build vital relationships with the external security researcher community and supplement the great work their internal security team is doing,” said Alex Rice, chief technology officer for HackerOne in a prepared statement. Qualcomm joins a number of high-profile and recently launched bug-bounty programs. Earlier this month the Department of Defense awarded a contract to HackerOne to bolster the cyber security of the U.S. Army’s digital assets. That complemented another investment by the U.S. government with Synack, which was picked to create a bug-bounty platform for the IRS. HackerOne also had a high profile Hack the Pentagon bug bounty program which ran from April 18 to May 12 earlier this year. Qualcomm and HackerOne said that 40 security researchers have been invited to participate. The bounty program includes a list of chipset models eligible for submissions, along with software components that include Linux kernel code (part of “Android for MSM”) and WLAN and Bluetooth firmware. At the top range of the bounty program are $15,000 rewards for critical bugs tied to Snapdragon cellular modems. Rewards of $9,000 are tied to ‘critical’ Trusted Execution Environment, or TEE, and bootloader vulnerabilities. Security vulnerabilities rated ‘high’ payout between $5,000 and $4,000. Vulnerabilities considered ‘medium’ and ‘low range’ offer rewards of $2,000 to $1,000. Not eligible, are issues tied to OEM modifications, some denial of service issues and bugs tied to PC software such as USB drivers, according to HackerOne. Qualcomm said the rewards program is effective starting November 17. Qualcomm’s bug bounty program comes on the heels of this summer’s revelation of four massive vulnerabilities, dubbed Quadrooter, which impacted over 900 million smartphones running Qualcomm chipsets. Security research firm Check Point discovered the vulnerabilities and said they could allow an attacker to elevate privileges on top Android handsets and give an attacker complete control over targeted devices. In October, Google released the last in a series of patches addressing the vulnerabilities.

See more at: Qualcomm and HackerOne Partner on Bounty Program https://wp.me/p3AjUX-vKy
Mobile Chipset Qualcomm and HackerOne Partner on Bounty Program by Tom Spring November 18, 2016 , 12:45 pm Qualcomm kicked off its first bug bounty program Thursday, opening the door for white hat hackers to find flaws in a dozen Snapdragon mobile chipsets and related software. Rewards for the invite-only bug bounty program top $15,000 each. HackerOne will facilitate Qualcomm’s bounty program; the chipmaker is hoping to secure millions of smartphones running Snapdragon silicon, including phones sold by Samsung, LG, HTC and Google. Related Posts Army Bug Bounty Building New Relationships with Hackers November 14, 2016 , 12:03 pm Google Releases Supplemental Patch for Dirty Cow Vulnerability November 8, 2016 , 1:38 pm GitLab Patches Command Execution Vulnerability November 3, 2016 , 2:50 pm Eligible Snapdragon products include eight mobile processors, four LTE modems and additional related silicon technologies and software. The bug bounty program will be administered through the Qualcomm Technologies business unit in conjunction with HackerOne. The program, Qualcomm claims, is the first of its kind for a major silicon vendor. “With Qualcomm Technologies’ vulnerability rewards program they will continue to build vital relationships with the external security researcher community and supplement the great work their internal security team is doing,” said Alex Rice, chief technology officer for HackerOne in a prepared statement. Qualcomm joins a number of high-profile and recently launched bug-bounty programs. Earlier this month the Department of Defense awarded a contract to HackerOne to bolster the cyber security of the U.S. Army’s digital assets. That complemented another investment by the U.S. government with Synack, which was picked to create a bug-bounty platform for the IRS. HackerOne also had a high profile Hack the Pentagon bug bounty program which ran from April 18 to May 12 earlier this year. Qualcomm and HackerOne said that 40 security researchers have been invited to participate. The bounty program includes a list of chipset models eligible for submissions, along with software components that include Linux kernel code (part of “Android for MSM”) and WLAN and Bluetooth firmware. At the top range of the bounty program are $15,000 rewards for critical bugs tied to Snapdragon cellular modems. Rewards of $9,000 are tied to ‘critical’ Trusted Execution Environment, or TEE, and bootloader vulnerabilities. Security vulnerabilities rated ‘high’ payout between $5,000 and $4,000. Vulnerabilities considered ‘medium’ and ‘low range’ offer rewards of $2,000 to $1,000. Not eligible, are issues tied to OEM modifications, some denial of service issues and bugs tied to PC software such as USB drivers, according to HackerOne. Qualcomm said the rewards program is effective starting November 17. Qualcomm’s bug bounty program comes on the heels of this summer’s revelation of four massive vulnerabilities, dubbed Quadrooter, which impacted over 900 million smartphones running Qualcomm chipsets. Security research firm Check Point discovered the vulnerabilities and said they could allow an attacker to elevate privileges on top Android handsets and give an attacker complete control over targeted devices. In October, Google released the last in a series of patches addressing the vulnerabilities.

See more at: Qualcomm and HackerOne Partner on Bounty Program https://wp.me/p3AjUX-vKy

No comments:

Post a Comment