COMMUNITY NIGHT WELCOME ADDRESS
BY EMIL TAN & FADLI SIDEK, SKIPPERS & CO-FOUNDERS, DIVISION ZERO (DIV0)
COMMUNITY NIGHT OPENING ADDRESS
BY DHILLON 'L33TDAWG' KANNABHIRAN, HACK IN THE BOX (HITB)
FINDING A BIG SUPPLY CHAIN ATTACK
BY VITALY KAMLUK, KASPERSKY LAB
Supply chain attacks are some of the least expected and hard to discover threats in the modern world. Often relying on valid digital signatures and reputation of the vendors many of security checks and mechanisms are letting malicious code injections through into vast number of victim computers. This year Kaspersky Lab has uncovered multiple cases of such compromises. We would like to share some insights from the investigation and send a message to all the software developers about the threat they need to be concerned of.
OLD-SKOOL COPY PROTECTION: DRM IN THE AGE OF MARIO
BY ALIZ HAMMOND, MWR INFOSECURITY
Back in the 1980s and 1990s, computing was very different to how it is today. With most videogames housed in arcade cabinets, or transferred on floppy disks (or even cassette tapes!), controlling access to data was a difficult task.
In this talk, I will talk about some esoteric and interesting ways that copy-protection has been attempted in the past, both successfully and otherwise. I'll talk about the use of lasers to melt floppy disk surfaces, tamper-resistant "suicide batteries", and the rude messages that developers have hidden in their software to dissuade pirates.
Some techniques are still in use to this day and may be relevant to your technical field — but mostly this is intended to sate your curiosity (and provide a history lesson for those that have never used a pen and paper to copy a codewheel so they can run the latest warez).
NETWORK & PARTY!