Check Point Press Releases

Media Alert: Check Point Presents Research Findings at Black Hat USA 2014 and DEF CON® 22

Check Point Cyber-security Experts to Present on August 7 at Black Hat and August 9 at DEF CON


San Carlos, CA  —  Thu, 07 Aug 2014

Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced that Tomer Teller and Kellman Meghu will present sessions at Black Hat USA, which takes place from August 2-7, 2014 at Mandalay Bay in Las Vegas, NV; and Shahar Tal will present a session at DEF CON 22, which takes place on August 7-10, 2014 at The Rio Hotel & Casino in Las Vegas, NV.


Check Point @ Black Hat USA

Visit Check Point in booth #553, Business Hall, Shoreline A, Mandalay Bay, Las Vegas

WHAT: Automated Memory Analysis, Presented by Tomer Teller, Security Innovation Research Manager:This session will introduce an open-source malware memory analysis utility that can be easily integrated into existing automated systems, discussing how to leverage existing plugins and combine them with other utilities and techniques in order to make powerful in-memory “behavioral combinations”. Additionally, this presentation will provide insight into when analysts should and should not use the three different types of analysis: static, dynamic and memory.
WHEN: Thursday, August 7, 2014 from 10:00 AM to 12:30 PM 
WHERE:  Shoreline B, Mandalay Bay, Las Vegas

WHAT: Weaponized Security, Presented by Kellman Meghu, Head of Security Engineering Central US and Canada: This talk discusses how a tool to secure people can be turned against them, and the results of random people, leaking data about their computers and themselves, harvested to build profiles and assumptions about who they are. This is all done with publicly available enterprise security tools, implemented in uncommon ways. Caution: This presentation contains unfiltered data and may be offensive in content and language. 
WHEN: Thursday, August 7, 2014 from 3:30 to 4:30 PM 
WHERE:  Business Hall — Theater B, Mandalay Bay, Las Vegas


Check Point @ DEF CON 22

WHAT: I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Presented by Shahar Tal, Vulnerability Research Team Leader: This presentation shines a bright light on TR-069/CWMP, a previously under-researched, de-facto CPE device management protocol, and specifically targets ACS (Auto Configuration Server) software, whose hostile takeover could have devastating effects on critical amounts of users. We investigate several TR-069 ACS platforms, and demonstrate multiple instances of poorly secured deployments, where we could have gained control over hundreds of thousands of devices. 
WHEN: Saturday, August 9, 2014 from 11:00 AM to 12:00 PM
WHERE: Track Three – The Rio Hotel & Casino, Las Vegas

Follow Check Point via

Twitter: www.twitter.com/checkpointsw 
Facebook: https://www.facebook.com/checkpointsoftware 
YouTube: https://www.youtube.com/user/CPGlobal

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point’s award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

 

×
  Feedback
Questo sito web utilizza cookies per la sua funzionalità e per scopi di analisi e marketing. Continuando a utilizzare questo sito Web, accetti l'utilizzo dei cookies. Per ulteriori informazioni, leggere la nostra Informativa sui cookie.
OK