«
Expand/Collapse
45 items tagged "russia"
Related tags:
hacking [+],
papers [+],
germany [+],
call for papers [+],
security guide [+],
security [+],
kenneth geers [+],
geers [+],
foreign [+],
chaos communication camp [+],
zeronights [+],
switzerland [+],
slovakia [+],
pci [+],
moscow russia [+],
moscow [+],
manuel atug [+],
israel [+],
france [+],
data [+],
call [+],
austria [+],
war [+],
united states [+],
teleprinter [+],
talk [+],
sven moritz hallberg [+],
siemens halske [+],
paper [+],
norway [+],
north america [+],
hack [+],
greenland [+],
german air force [+],
foreign language [+],
finland [+],
earth [+],
denmark [+],
crypto [+],
control [+],
chaos communication congress [+],
canada [+],
arne beurling [+],
arctic [+],
schools in germany [+],
school [+],
saint petersburg russia [+],
russian [+],
prosecution [+],
petersburg [+],
language [+],
joseph menn [+],
information [+],
ilya v. vasilyev [+],
iii [+],
hacker activity [+],
fatal system error [+],
extortion racket [+],
education relations [+],
cybercrime [+],
computer threats [+],
brief summary [+],
black hat [+],
art [+],
arrests [+],
worldpay [+],
works [+],
wikileaks [+],
web [+],
vienna [+],
video [+],
u.s. [+],
trade [+],
tracking [+],
tool [+],
ton [+],
tags [+],
swapped [+],
stopped [+],
state [+],
spying [+],
spies [+],
slides [+],
shift [+],
secret [+],
russia with love [+],
russia trade [+],
russia today [+],
recent [+],
poll [+],
plea [+],
pass [+],
operators [+],
novaya gazeta [+],
novaya [+],
network [+],
monster [+],
microsoft [+],
malaysia [+],
mafia [+],
love [+],
launch [+],
killers [+],
international security conference [+],
hunting [+],
herder [+],
haters [+],
hackers [+],
hack in the box [+],
hack attack [+],
gazeta [+],
flown [+],
feds [+],
fbi [+],
exploit [+],
exe [+],
email [+],
downed [+],
defcon [+],
conference [+],
china [+],
charge [+],
cfp [+],
botnet [+],
bot [+],
body [+],
blackhole [+],
ballistic missile [+],
audio [+],
asia [+],
allegedly [+],
alexander litvinenko [+],
alexander [+],
aims [+]
-
-
20:01
»
Packet Storm Security Recent Files
This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. The bulk of the information in this paper was based on data gathered from online forums and services used by Russian cybercriminals. The authors also relied on articles written by hackers on their activities, the computer threats they create, and the kind of information they post on forums’ shopping sites.
-
20:01
»
Packet Storm Security Misc. Files
This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. The bulk of the information in this paper was based on data gathered from online forums and services used by Russian cybercriminals. The authors also relied on articles written by hackers on their activities, the computer threats they create, and the kind of information they post on forums’ shopping sites.
-
-
10:19
»
SecDocs
Authors:
Sven Moritz Hallberg Tags:
cryptography Event:
Chaos Communication Camp 2007 Abstract: This talk will describe how a team of Swedish cryptanalysts broke the electromechanical cryptographic teleprinter "Siemens & Halske T52" which was used by the Germans during World War II for "important" traffic. It contained a stream cipher implementation much more sophisticated than the substitution engine of the well-known Enigma. The talk will focus on reconstructing how the Swedes, specifically the key figure of Arne Beurling, could have gotten the ideas for breaking the cipher -- a process about which next to no historical accounts exist. The machine called Enigma, widely famous for being used by German armies during World War II to secretly (or so they hoped) communicate among troops, was a field device. It was portable, simple to operate, as well as relatively cheap to produce, containing neither electrical motors nor any coding/decoding assembly. It was, however, not the only crypto device employed by the Germans. The Siemens & Halske T52 (in its several variants), commonly referred to as the Geheim- or G-Schreiber (German for "secretly-writer"), was a teleprinter with integrated encryption/decryption facility. It was cryptographically superior to the Enigma and, by its nature, much more sophisticated in terms of its electro-mechanical engineering. Due to the latter, it was also much bulkier, weighing no less than 100kg, excluding the transport case. Therefore it was used as a stationary unit, primarily by the German air force, navy, and for diplomatic purposes. In total, about 600 units were in operation. From April 1940, Swedish authorities gained access to large quantities of T52-encrypted telegraph traffic. With Norway just invaded and significant parts of Finland already surrendered to Russia, the Swedes were obviously interested in the plaintexts and, having been quite successful at breaking Russian and French crypto already, promptly tried their luck in deciphering the German messages. The initial successfull cryptanalysis was done in only a matter of weeks by a scientist named Arne Beurling with next to no knowledge but the mere basics of teleprinter technology and a bunch of ciphertext intercepts. Unfortunately he refused to talk about the details of how he actually broke the cipher. This talk will try to reconstruct a possible sequence of ideas that could have led to the eventual breaking of the code. Thus it tries to shed some light on the "magical" work of a cryptanalyst.
-
10:19
»
SecDocs
Authors:
Sven Moritz Hallberg Tags:
cryptography Event:
Chaos Communication Camp 2007 Abstract: This talk will describe how a team of Swedish cryptanalysts broke the electromechanical cryptographic teleprinter "Siemens & Halske T52" which was used by the Germans during World War II for "important" traffic. It contained a stream cipher implementation much more sophisticated than the substitution engine of the well-known Enigma. The talk will focus on reconstructing how the Swedes, specifically the key figure of Arne Beurling, could have gotten the ideas for breaking the cipher -- a process about which next to no historical accounts exist. The machine called Enigma, widely famous for being used by German armies during World War II to secretly (or so they hoped) communicate among troops, was a field device. It was portable, simple to operate, as well as relatively cheap to produce, containing neither electrical motors nor any coding/decoding assembly. It was, however, not the only crypto device employed by the Germans. The Siemens & Halske T52 (in its several variants), commonly referred to as the Geheim- or G-Schreiber (German for "secretly-writer"), was a teleprinter with integrated encryption/decryption facility. It was cryptographically superior to the Enigma and, by its nature, much more sophisticated in terms of its electro-mechanical engineering. Due to the latter, it was also much bulkier, weighing no less than 100kg, excluding the transport case. Therefore it was used as a stationary unit, primarily by the German air force, navy, and for diplomatic purposes. In total, about 600 units were in operation. From April 1940, Swedish authorities gained access to large quantities of T52-encrypted telegraph traffic. With Norway just invaded and significant parts of Finland already surrendered to Russia, the Swedes were obviously interested in the plaintexts and, having been quite successful at breaking Russian and French crypto already, promptly tried their luck in deciphering the German messages. The initial successfull cryptanalysis was done in only a matter of weeks by a scientist named Arne Beurling with next to no knowledge but the mere basics of teleprinter technology and a bunch of ciphertext intercepts. Unfortunately he refused to talk about the details of how he actually broke the cipher. This talk will try to reconstruct a possible sequence of ideas that could have led to the eventual breaking of the code. Thus it tries to shed some light on the "magical" work of a cryptanalyst.
-
-
21:43
»
SecDocs
Authors:
Sven Moritz Hallberg Tags:
cryptography Event:
Chaos Communication Camp 2007 Abstract: This talk will describe how a team of Swedish cryptanalysts broke the electromechanical cryptographic teleprinter "Siemens & Halske T52" which was used by the Germans during World War II for "important" traffic. It contained a stream cipher implementation much more sophisticated than the substitution engine of the well-known Enigma. The talk will focus on reconstructing how the Swedes, specifically the key figure of Arne Beurling, could have gotten the ideas for breaking the cipher -- a process about which next to no historical accounts exist. The machine called Enigma, widely famous for being used by German armies during World War II to secretly (or so they hoped) communicate among troops, was a field device. It was portable, simple to operate, as well as relatively cheap to produce, containing neither electrical motors nor any coding/decoding assembly. It was, however, not the only crypto device employed by the Germans. The Siemens & Halske T52 (in its several variants), commonly referred to as the Geheim- or G-Schreiber (German for "secretly-writer"), was a teleprinter with integrated encryption/decryption facility. It was cryptographically superior to the Enigma and, by its nature, much more sophisticated in terms of its electro-mechanical engineering. Due to the latter, it was also much bulkier, weighing no less than 100kg, excluding the transport case. Therefore it was used as a stationary unit, primarily by the German air force, navy, and for diplomatic purposes. In total, about 600 units were in operation. From April 1940, Swedish authorities gained access to large quantities of T52-encrypted telegraph traffic. With Norway just invaded and significant parts of Finland already surrendered to Russia, the Swedes were obviously interested in the plaintexts and, having been quite successful at breaking Russian and French crypto already, promptly tried their luck in deciphering the German messages. The initial successfull cryptanalysis was done in only a matter of weeks by a scientist named Arne Beurling with next to no knowledge but the mere basics of teleprinter technology and a bunch of ciphertext intercepts. Unfortunately he refused to talk about the details of how he actually broke the cipher. This talk will try to reconstruct a possible sequence of ideas that could have led to the eventual breaking of the code. Thus it tries to shed some light on the "magical" work of a cryptanalyst.
-
-
21:50
»
SecDocs
Authors:
Ilya V. Vasilyev Tags:
hacking Event:
Chaos Communication Camp 2007 Abstract: At the beginning of 90s Soviet (now Russian) hackerdom begin to experience same problems, as everywhere. Journalists became to blame computer fandom in virtually every crime they could imagine. At 1996, I have found just another solution by opening the School of Hacking Art very like karate-do Schools. In Germany there was TV Show "Die Hackerschule. Galileo. ProSieben. November, 13, 2000, 19:30 about the School. Also here is something in German, check it: http://web.archive.org/web/20050218210212/hscool.net/about/article2.html The event will be a free-style seminar. The basic idea: What have already been done, what should be done. The history of hacking education, relations/communications with government, business, media, etc. Strength and weakness of this way. Some examples of educational technologies from Russia, that are helpful to the whole underground. Q&A session.
-
21:50
»
SecDocs
Authors:
Ilya V. Vasilyev Tags:
hacking Event:
Chaos Communication Camp 2007 Abstract: At the beginning of 90s Soviet (now Russian) hackerdom begin to experience same problems, as everywhere. Journalists became to blame computer fandom in virtually every crime they could imagine. At 1996, I have found just another solution by opening the School of Hacking Art very like karate-do Schools. In Germany there was TV Show "Die Hackerschule. Galileo. ProSieben. November, 13, 2000, 19:30 about the School. Also here is something in German, check it: http://web.archive.org/web/20050218210212/hscool.net/about/article2.html The event will be a free-style seminar. The basic idea: What have already been done, what should be done. The history of hacking education, relations/communications with government, business, media, etc. Strength and weakness of this way. Some examples of educational technologies from Russia, that are helpful to the whole underground. Q&A session.
-
-
21:31
»
SecDocs
Authors:
Manuel Atug Tags:
credit card PCI DSS Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: MasterCard and Visa have jointly released the PCI Data Security Standard which defines security requirements for the processing of card data in face-to-face and card-absent transactions. This presentation will deal with the most critical security gaps. SRC is an auditor approved by MasterCard and Visa to carry out PCI Security Scans and PCI Security Audits. Currently, SRC serves about 3000 merchants and 40 payment service providers around Germany, Austria, Switzerland, France, Russia, Slovakia and Israel. The speaker will first briefly introduce the PCI security requirements. Then, he will disclose the company's experiences and lessons learned when conducting PCI Security Scans and PCI Security Audits.
-
21:31
»
SecDocs
Authors:
Manuel Atug Tags:
credit card PCI DSS Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: MasterCard and Visa have jointly released the PCI Data Security Standard which defines security requirements for the processing of card data in face-to-face and card-absent transactions. This presentation will deal with the most critical security gaps. SRC is an auditor approved by MasterCard and Visa to carry out PCI Security Scans and PCI Security Audits. Currently, SRC serves about 3000 merchants and 40 payment service providers around Germany, Austria, Switzerland, France, Russia, Slovakia and Israel. The speaker will first briefly introduce the PCI security requirements. Then, he will disclose the company's experiences and lessons learned when conducting PCI Security Scans and PCI Security Audits.
-
21:31
»
SecDocs
Authors:
Manuel Atug Tags:
credit card PCI DSS Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: MasterCard and Visa have jointly released the PCI Data Security Standard which defines security requirements for the processing of card data in face-to-face and card-absent transactions. This presentation will deal with the most critical security gaps. SRC is an auditor approved by MasterCard and Visa to carry out PCI Security Scans and PCI Security Audits. Currently, SRC serves about 3000 merchants and 40 payment service providers around Germany, Austria, Switzerland, France, Russia, Slovakia and Israel. The speaker will first briefly introduce the PCI security requirements. Then, he will disclose the company's experiences and lessons learned when conducting PCI Security Scans and PCI Security Audits.
-
21:31
»
SecDocs
Authors:
Manuel Atug Tags:
credit card PCI DSS Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: MasterCard and Visa have jointly released the PCI Data Security Standard which defines security requirements for the processing of card data in face-to-face and card-absent transactions. This presentation will deal with the most critical security gaps. SRC is an auditor approved by MasterCard and Visa to carry out PCI Security Scans and PCI Security Audits. Currently, SRC serves about 3000 merchants and 40 payment service providers around Germany, Austria, Switzerland, France, Russia, Slovakia and Israel. The speaker will first briefly introduce the PCI security requirements. Then, he will disclose the company's experiences and lessons learned when conducting PCI Security Scans and PCI Security Audits.
-
-
13:36
»
SecDocs
Tags:
social Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Russia, Canada, the United States and Denmark are each pushing for more control and access to the resources of the Arctic. In the balance hangs the future of an entire ecosystem and our planet. In August of 2007, a Russian submarine planted a flag under water claiming more territory on the sea bed of the arctic for Russia. Back home they were welcomed as heros, like cosmonauts returning from the moon. In the boardrooms of the state owned oil company, executives were already salivating about the alleged oil and gas reserves that lay untapped below their chunk of the arctic. Meanwhile in North America, similar salivating is taking place, as both Canada and the United States send military and civilian ships to claim their piece of the alleged pie. In between there's Greenland, administered by the Danes, who also realize there's money to made and national pride at stake. But what about the people of the earth? The communities, the ecosystem, both in the arctic and throughout the globe... What will happen to them if the Arctic meltrush goes into full throttle? This talk is about the new cold war, where nations and corporations carve up one of the most important regions on earth and fight amongst themselves for control.. for money.. for power. And as the melt-rush goes forward, citizens of the world are left in the dark about just what plans their governments have and what is at stake for every living thing on earth.
-
13:34
»
SecDocs
Tags:
social Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Russia, Canada, the United States and Denmark are each pushing for more control and access to the resources of the Arctic. In the balance hangs the future of an entire ecosystem and our planet. In August of 2007, a Russian submarine planted a flag under water claiming more territory on the sea bed of the arctic for Russia. Back home they were welcomed as heros, like cosmonauts returning from the moon. In the boardrooms of the state owned oil company, executives were already salivating about the alleged oil and gas reserves that lay untapped below their chunk of the arctic. Meanwhile in North America, similar salivating is taking place, as both Canada and the United States send military and civilian ships to claim their piece of the alleged pie. In between there's Greenland, administered by the Danes, who also realize there's money to made and national pride at stake. But what about the people of the earth? The communities, the ecosystem, both in the arctic and throughout the globe... What will happen to them if the Arctic meltrush goes into full throttle? This talk is about the new cold war, where nations and corporations carve up one of the most important regions on earth and fight amongst themselves for control.. for money.. for power. And as the melt-rush goes forward, citizens of the world are left in the dark about just what plans their governments have and what is at stake for every living thing on earth.
-
13:33
»
SecDocs
Tags:
social Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Russia, Canada, the United States and Denmark are each pushing for more control and access to the resources of the Arctic. In the balance hangs the future of an entire ecosystem and our planet. In August of 2007, a Russian submarine planted a flag under water claiming more territory on the sea bed of the arctic for Russia. Back home they were welcomed as heros, like cosmonauts returning from the moon. In the boardrooms of the state owned oil company, executives were already salivating about the alleged oil and gas reserves that lay untapped below their chunk of the arctic. Meanwhile in North America, similar salivating is taking place, as both Canada and the United States send military and civilian ships to claim their piece of the alleged pie. In between there's Greenland, administered by the Danes, who also realize there's money to made and national pride at stake. But what about the people of the earth? The communities, the ecosystem, both in the arctic and throughout the globe... What will happen to them if the Arctic meltrush goes into full throttle? This talk is about the new cold war, where nations and corporations carve up one of the most important regions on earth and fight amongst themselves for control.. for money.. for power. And as the melt-rush goes forward, citizens of the world are left in the dark about just what plans their governments have and what is at stake for every living thing on earth.
-
-
21:39
»
SecDocs
-
21:39
»
SecDocs
-
-
21:51
»
SecDocs
-
-
12:42
»
SecDocs
-
-
4:16
»
SecDocs
Authors:
Joseph Menn Tags:
cybercrime Event:
Black Hat DC 2010 Abstract: Almost all of the talk from Western law enforcement agencies of signs of cooperation by Russian authorities in the pursuit of master cybercriminals is an expression of hope, not experience. There is one major documented exception: the 2006 prosecution, conviction and imprisonment of three members of a criminal ring that organized and carried out dozens of denial-of-service attacks on business websites worldwide as part of an extensive extortion racket. Why that case succeeded where all others failed--and why its success has never been replicated, has never been explained. Based on years of research including the only interviews with Russian authorities and the British police detective sent to work with the MVD, author and Financial Times correspondent Joseph Menn gives the highlights of the account in his just-published book, FATAL SYSTEM ERROR: The Hunt for the New Crime Lords Who Are Bringing Down the Internet.
-
4:16
»
SecDocs
Authors:
Joseph Menn Tags:
cybercrime Event:
Black Hat DC 2010 Abstract: Almost all of the talk from Western law enforcement agencies of signs of cooperation by Russian authorities in the pursuit of master cybercriminals is an expression of hope, not experience. There is one major documented exception: the 2006 prosecution, conviction and imprisonment of three members of a criminal ring that organized and carried out dozens of denial-of-service attacks on business websites worldwide as part of an extensive extortion racket. Why that case succeeded where all others failed--and why its success has never been replicated, has never been explained. Based on years of research including the only interviews with Russian authorities and the British police detective sent to work with the MVD, author and Financial Times correspondent Joseph Menn gives the highlights of the account in his just-published book, FATAL SYSTEM ERROR: The Hunt for the New Crime Lords Who Are Bringing Down the Internet.