Brazilian Army (BR)
He is Rogerio Winter and he is a researcher in Brazilian Army Cyber Defense.
Luke 8:17 – Misleading implementations that compromise the privacy and information security
The security of information has grown in importance in the world. Businessperson need more often moving around between offices, cities and even countries. Notably, many devices are stolen each year and many of the company’s strategic information are lost. Our work has evolved to an analysis of three existing consecrated encryption systems on the market: Bitlocker, Bitdefender and TrueCrypt. We were able to prove that outdated concepts are still being used to protect the information of people, companies and governments. We show how failures in their development, commercial inconsistencies and poor implementation can continue exposing secrets of people, businesses and governments.
Abstract Apoc@lypse Technique
This presentation will based on book Apoc@lypse: the end of antivirus.
The Apoc@lypse technique is based on the exploration of the vulnerability of the anti-malware systems. It allows to infect in the furtive form a target equipment destroying the operating systems and data. Apocalypse technique is not a malware; we call a cyber autoimmune disease.
Properly used, Apoc@lypse technique permit to explore failures as cyber weapon. The efficiency of this technique was successfully tested in 150 anti-malware systems.
Are you the next cyber security superstar?
Ready for this year's presentations?
By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.
Sponsors & Partners
They help us make this conference possible.
Orange „brings you closer to what matters to you”.
This is our brand promise: to bring our clients closer to what’s essential to them and to keep them always connected and in touch with the latest technologies, by offering them the best and safest communication experience.