Malware in Google Play: Latest tactics used to penetrate the official app store

…phones from app stores. The most common security recommendation is to avoid downloading from third-party app stores and to use the official Google app store. Despite all efforts to scan…

Read more

Bust a Cap in an Android App

This talk will introduce the audience to the nuts and bolts of Android hacking. Patrick and Veytsman will demonstrate how to take apart an Android application and hunt for vulnerabilities….

Read more

Frugal Web Application Testing – Can in-house penetration testing achieve industry standard results while saving you money?

We live in a time where web applications play crucial roles in our society. To deploy a web application into production without properly securing the code and conducting a penetration…

Read more

The Tools of a Web App Pentester

During a web application penetration test, a tester often encounters different technology stacks and security controls implementations that requires the use of different tools and testing approaches. While commercial tools…

Read more

CryCryptor, the Fake COVID-19 Tracing App That Targeted Canadians

…unsuspecting visitors. We will then dive into the case of CryCryptor, an Android ransomware, posing as a COVID-19 tracing application. We start by showing how the malware distribution scheme was…

Read more

OAuth – Everything You Wanted to Know but Not Really!

…This includes apps that enterprises develop or use to connect to G Suite or cloud providers such as BOX and Google Firebase. When users grant an app to access their…

Read more

Secure and Scalable Development with Microsoft 365 and Azure AD

…architecture that combines delegated and application access to Microsoft 365 through an App Service model, including auto-scale of the App Service that also addresses Microsoft 365 throttling constraints. The plan…

Read more

Is Anti-Virus Software Really Dead?

…Android are doing,” he said. He points to their app stores, which use automated scanning tools to protect users by trying to catch applications before they are made available. Apple…

Read more

Cyberthreats: Kevin McNamee on the Evolving Dangers From Mobile Malware

…illegitimate versions of XCode, the development environment used to produce iOS applications. This resulted in compromised versions of apps in the iTunes App Store. As malware writers become more sophisticated,…

Read more

Securing Network Communications: An Investigation into Certificate Authorities on Mobile

…Additionally, this talk will look at the technical changes happening for mobile app developers in the latest mobile operating systems to help take control of the trust chain via techniques…

Read more

It’s Nearly Time!

…in early November. Finally, use the event app, Eventboard, to navigate your way around the conference. Download the app here, for iOS, Android, Windows Phone, or Windows. Search for SecTor…

Read more

Social Stream

[fts_mashup posts=12 social_network_posts=6 words=45 center_container=yes show_social_icon=right show_media=top show_date=yes show_name=yes facebook_name=SecTorConference twitter_name=sectorca grid=yes channel_id=UChoKA8GQo6XIRxJOIDE15oA column_width=300px space_between_posts=7px]…

Read more

Tony Lee

…Web shell, and Cisco’s SYNFul Knock router implant. Over the years, he has contributed many tools to the security community such as UnBup, Forensic Investigator Splunk app, and CyBot, the…

Read more

Cloud Native Security Explained

…Threat Protection, Alerts and Logging Applying Just in Time Forcing HTTPS on an app service Anything else the audience wants to see, and that time will allow for Tanya Janca…

Read more

2019 Expo

…Tools (716AB) Using Static And Runtime Analysis To Understand Third-Party Applications – Guy Acosta 10:45 11:15 Theatre (803AB) Phishing Defense: The Art of Human Intuitive Repulsion – Jason Meurer 11:30…

Read more
experts-online-voting-covid-19

Despite COVID-19, experts warn against online voting

…attacker wanting to change a transaction would have to rehash all the blocks that came after it. Since bitcoin, alternatives have emerged that use slightly different approaches, but they all…

Read more

SASE Success Behind-The-Scenes

SASE converges network, web, data, and cloud app connectivity and security, but implementing a true SASE architecture is a daunting task and there is no one-size-fits-all approach. Join Forcepoint Global…

Read more

Press Room

…21/10/16 “Over 70,000 Canadian credit cards suddenly on sale on dark web: SecTor” – Link 21/10/16 “SecTor Features Snowden Appearance, Call to Secure All the ‘Things’” – Link 20/10/16 “Women…

Read more

Tech for Good, Maybe

Cambridge Analytica paid a data scientist 800k to develop an app called ‘This is Your Digital Life’. Facebook gave it a platform, and soon Analytica had the data necessary to…

Read more
sector-when-bug-hunters-target-malware

When Malware Developers Slip Up

…a little more in their source than they ought. Back in 2017, Vice reported that GR Sistemi, the author of an Android spyware app sold to organizations hoping to spy…

Read more

Stephane Asselin

…specialist lead on beta programs. He has worked as a subject matter expert for Horizon Workspace, View, Mirage, vCenter Operations Manager, App Volumes, UEM and ThinApp projects. Previously, he was…

Read more

Tal Be’ery

Tal Be’ery is a Co-Founder of ZenGo, securing crypto assets with the ZenGo Wallet mobile app. Tal is a cyber-security researcher, returning speaker in the industry’s most prestigious events, including…

Read more

Matan Hamilis

Matan Hamilis is a cryptography researcher at ZenGo, enabling the secure management of crypto assets with a dedicated wallet mobile app. Formerly, Matan was a cybersecurity research team lead at…

Read more

CSA Summit at SecTor

…years before that as an amateur programmer. Peter has spent the last 15 years in the world of web application development and application security. As an independent consultant, Peter spent…

Read more

Johnathan Azaria

Experienced Data Scientist and Tech Lead at Imperva’s threat research group where I work on creating machine learning algorithms to help protect our customers against web app and DDoS attacks….

Read more
Why Cloud Data Keeps Getting Exposed

Why Cloud Data Exposures Keep Happening

…are the embarrassing ones. Online Buddies, which makes the LGBQT dating app Jack’d, just shouldered a $240,000 fine after reports emerged in February that it had left images of almost…

Read more

Swaroop Yermalkar

Swaroop Yermalkar works as a Senior Security Engineer at Philips. His work includes threat modelling, security research, assessment of IoT devices, healthcare products, web applications, networks, Android, and iOS applications….

Read more
Why We Must Fight Breach Fatigue

Why We Must Fight Breach Fatigue

…The answer is the same as it always has been: increasing cybersecurity hygiene. Software patches, application white listing, proper access management and multi-factor authentication, application hardening and user training can…

Read more
This New Tech Could Keep Defenders Ahead in the Cybersecurity Wars

How New Tech Could Keep Defenders Ahead in the Cybersecurity Wars

…via a text message to your phone (or, more securely, a mobile authenticator app). They might use a hardware token, a digital certificate, a biometric signal, or a combination of…

Read more
A look inside the phishing business

A Look Inside the Phishing Business

…analyze the data it at their leisure. This all shows that the cost of entry for phishing is appallingly low, which explains why so much of it goes on. It…

Read more
Blockchain ID

The Blockchain: Your New ID Card

…tech for a while, unveiled an application using the decentralized ledger technology. It tackles a problem facing over a billion people worldwide which goes far beyond identity theft: they have…

Read more
Incident Response

How To Handle A Security Breach

…exposed the personal details of 22 million people is now legendary (and the Congressional report makes great reading). There’s the finger pointing: Child monitoring app firm UKnowKids disparaged security researcher…

Read more
The Flaw In Encryption Back Doors

The Flaw In Encryption Back Doors

…thing. The UK government already asked WhatsApp for a back door. It said no. The FBI has repeatedly tussled with Apple, which refuses to provide a back door and is…

Read more
John Turner

John Turner

app-dev and dev-ops teams. His background also includes extensive experience with infrastructure, WLAN, performance management, analytics, data center builds, enterprise resource planning implementations, identity and access management development, firewall and…

Read more

Eric Sun

…behavior analytics and risk management from his many years in Asia as a professional poker player. Previously, Eric was at custom mobile app developer, Zco Corporation, based in New Hampshire….

Read more

Finding Flaws in IoT Devices

…cases, it makes the concept of a ‘smart’ TV an oxymoron. One unit he saw contained a flaw that enabled anyone on the request to launch a YouTube app, but…

Read more

Certifi-gate: Has your Android device been Pwned?

…mobile Remote Support Tool (mRST) apps and system-level plugs used by virtually every Android device maker and network service provider. Exploitation gives malicious apps unrestricted device access with elevated privileges…

Read more

SDN : Radically New Network Architecture, Same Old Cyber Security Protection

app for this new platform. Join us as we share strategy and tactics on how customers who are upgrading to SDN networks can integrate next generation Advanced Cyber Security protection…

Read more

Trust No One: The New Security Model for Web APIs

There are many great things about the new world of mobile and cloud applications. They enable us to be more connected and productive in our daily lives, whether it be…

Read more

Introducing ‘Android Security Evaluation Framework’ ASEF

Have you ever looked at your Android applications and wondered if they are watching you as well? Whether it’s a bandwidth-hogging app, aggressive adware or even malware, it would be…

Read more
Chris Vickery

Chris Vickery: Finding the Crown Jewels Online

…position as a security researcher after he found a similarly open MongoDB database of theirs. Not all companies are that warm and fuzzy. Vickery told child safety app vendor UKnowKids…

Read more

Defrauding Merchants like it’s Y2K

…to secure their systems can be victims of fraud. In this talk, we will cover some examples of payment APIs and mobile in-app purchases (e.g., with Apple Pay or Google…

Read more