Tripwire Security Researchers to Present at DEF CON 23
PORTLAND, Ore. — July 23, 2015 — Tripwire, Inc., a leading global provider of advanced threat, security and compliance solutions, today announced that Ken Westin, senior security analyst, and Craig Young, security researcher, will each be presenting at DEF CON 23. The conference will take place August 6-9, 2015, at the Paris and Bally's Convention Centers in Las Vegas, Nevada.
Details of Westin’s Presentation:
Ken Westin has spent years developing and employing technologies to track criminals. By tracking and recovering stolen devices, including pilfered cars, Westin has brought down crime rings and provided evidence that has led to at least two dozen convictions. The evidence in these cases came from the stolen items; Westin also used open source data to target specific criminals. In this presentation, Westin will walk through real cases and discuss his crime tracking methods. He will also provide advice for consumers so they can protect themselves against similar techniques.
Session Title: “Confessions of a Professional Cyber Stalker”
Who: Ken Westin, senior security analyst, Tripwire
When: Friday, August 7, 2015, 12:00 PM PST
Details of Young’s Presentation:
Despite their insecurity, low-frequency Radio Frequency Identification (RFID) access control badges and high-frequency Near Field Communication (NFC) technology can be found in many businesses and products. RFID hacking tools, like Proxmark3 and RFIDler, are invaluable for penetration testers and security researchers alike. Unfortunately, there are few resources available for users who want to learn how to develop new firmware to equip these devices with purpose-built logic. In this presentation, Craig Young will discuss the overall architecture of the Proxmark3 and RFIDler tools and provide tutorial style examples for enhancing the firmware.
Session Title: “How to Train Your RFID Hacking Tools”
Who: Craig Young, security researcher, Tripwire
When: Friday, August 7, 2015, 6:00 PM PST
Tripwire is a leading provider of security, compliance and IT operations solutions for enterprises, industrial organizations, service providers and government agencies. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business context; together these solutions integrate and automate security and IT operations. Tripwire’s portfolio of enterprise-class solutions includes configuration and policy management, file integrity monitoring, vulnerability management, log management, and reporting and analytics. Learn more at tripwire.com, get security news, trends and insights at https://www.tripwire.com/blog/ or follow us on Twitter @TripwireInc.