jeudi 20 mars 2014

Hack in Paris

(English version below)
Découvrez les conférences sélectionnées pour HACK IN PARIS 2014!

Cette année nous vous proposons 15 conférences en anglais et données par des intervenants de renom international.

Au programme:

Paul Coggins : Digitam Energy-BPT
Aamir Lakhani Walking Above the Silk Road for 24 Hours
Sebastien Andrivet : C++11 metaprogramming technics applied to software obfuscation 
Cyrill BrunschwilerEnergy Fraud and Orchestrated Blackouts: Issues with Wireless Metering Protocols (wM-Bus)
Thomas Wang : Breaking through the bottleneck: Mobile malware is outbreak spreading like wildfire.
Mario HeiderichJSMVCOMFG ;  To sternly look at JavaScript MVC and Templating Frameworks
Sonya Solomon : Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network
Alvaro AlexanderExtreme forensics Reloaded 2Q /2014
Jayson E. Street : Around the world in 80 cons! 
Joseph Pi Rodriguez : Fuzzing reversing and Maths
Xeno Kovah : Defeating UEFI/win8 SecureBoot
Deral Heiland : Plunder,Pillage and Print
Francis Alexander : Pentesting NoSQL DB'S with NoSQL Exploitation Framework
Krzystof Kotowicz : Biting into the forbidden fruit.Lessons from trusting Javascript crypto
Thomas Roth : ARM AArch64: Writing exploits for the new ARM architecture

Retrouvez le détail des conférences et inscrivez-vous sur https://hackinparis.com/talks

Pour plus d'informations contactez Layla : l.daroueche@sysdream.com  Twitter @HACKINPARIS

------------------------------------------------------------
Discover the HACK IN PARIS 2014 talks selected!

This year you can attend 15 talks, all in English and done by international renown speakers.

On the program:
Paul Coggins : Digitam Energy-BPT
Aamir Lakhani Walking Above the Silk Road for 24 Hours
Sebastien Andrivet : C++11 metaprogramming technics applied to software obfuscation 
Cyrill BrunschwilerEnergy Fraud and Orchestrated Blackouts: Issues with Wireless Metering Protocols (wM-Bus)
Thomas Wang : Breaking through the bottleneck: Mobile malware is outbreak spreading like wildfire.
Mario HeiderichJSMVCOMFG ;  To sternly look at JavaScript MVC and Templating Frameworks
Sonya Solomon : Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network
Alvaro AlexanderExtreme forensics Reloaded 2Q /2014
Jayson E. Street : Around the world in 80 cons! 
Joseph Pi Rodriguez : Fuzzing reversing and Maths
Xeno Kovah : Defeating UEFI/win8 SecureBoot
Deral Heiland : Plunder,Pillage and Print
Francis Alexander : Pentesting NoSQL DB'S with NoSQL Exploitation Framework
Krzystof Kotowicz : Biting into the forbidden fruit.Lessons from trusting Javascript crypto
Thomas Roth : ARM AArch64: Writing exploits for the new ARM architecture

Go on our website to get more details on the talks and register on https://hackinparis.com/talks

For further details, please contact Layla : l.daroueche@sysdream.com  Twitter @HACKINPARIS

Wordpress security book

If you would like to stop receiving WordPress security alerts and product updates from Wordfence, you can click here.  You subscribed to this list via the Wordfence security plugin for WordPress.  If you find this alert helpful, please give us a 5 star rating on WordPress.org. 
There is a CSRF and directory traversal vulnerability in the commercial LayerSlider WordPress plugin version 4.6.1. The vulnerability was released publicly on March 11th. We haven't been able to find the change history with dates for LayerSlider, but the current version appears to be 5.1.1 and we suspect 4.6.1 is a recent version, so please check which version you're running and upgrade if necessary. The vulnerability may also affect older versions of LayerSlider. This is a popular plugin and is incorporated in many themes. You can find out more about the vulnerability on PacketStorm.
We're seeing an increase in brute force attacks (password guessing attacks) across WordPress sites from 2000/min to peaks of 15,000 currently. The attack started just after noon yesterday March 18th Pacific Time and gradually increased to a peak of 15,000 attacks per minute today March 19th at 5am and it's currently holding at that frequency. This looks like it will be a sustained attack and will likely last from 24 more hours to several days. Please keep a close eye on your WordPress sites for unusual activity and ensure your backups are current. Share this data with any other WordPress site owners you know. As always you can view/track the attack using our real-time graph and attack map at http://www.wordfence.com/


 a


A vendor recently posted a blog entry on XMLRPC based distributed denial of service attacks. The post was picked up in the press and we have received several questions about this. The issue the vendor mentions is a well known item that the WordPress core team has been aware of since 2007.  It generated a fair amount of press and WordPress creator Matt Mullenweg released the following statement:
"This tradeoff in pingback's design has been there for a decade now. It's seldom used outside of experimentation because it gets shut down by anti-spam providers like Akismet or web hosts when used at any scale, and there are cheaper, easier, and more effective ways to DDOS sites. That's why no serious attacks (above 2gbps) use it."
It's important to note that this issue does not introduce a vulnerability in sites that enable pingback via XMLRPC, but merely lets an attacker bundle your site into a huge number of other WordPress sites and use those sites to send a large amount of traffic to a target site in the hope of bringing that site to its knees under the heavy load. As Matt says, there are far easier ways to overwhelm a website with traffic.
Our recommendation is to install Akismet spam filtering for comments, which you've probably already done - and keep your themes, plugins and WordPress core versions current, which you're hopefully already doing. You should also be wary of running any software that is not maintained by an active author or development community and that includes your themes and plugins. If a legitimate vulnerability exists in WordPress core, the core dev team will release a fix in a timely fashion.
The WordPress.org publishing platform continues to be an excellent, well maintained and relatively secure platform, so go forth and publish and create with confidence.
If you found this alert helpful, please give us a 5 star rating on WordPress.org on the right of the page.
Mark Maunder
Wordfence Creator & Feedjit Inc. CEO.

PS: If you aren't already a member you can subscribe to our WordPress Security and Product Updates mailing list here. You're welcome to republish this email in part or in full provided you mention that the source iswww.wordfence.com. If you would like to get Wordfence for your WordPress website, simply go to your "Plugin" menu, click "add new" and search for "wordfence".