GuadalajaraCon is a new security conference in Latin America (it started in 2012), that hosts high-level technical talks.
On its first edition we were able to see excellent material, focusing on cryptographic analysis and Routers penetration (The Routerpwn project).
With much joy I can tell you that the Call For Papers for the 2013 edition is now open
So think of a good talk and submit it. But it has to be a good one!
The link for the CFP can be found here
I hope to see you there
We’re reminded by the sites we log in to, daily. It’s mentioned by every IT and Security guy all the time. However, people doesn’t comply.
Passwords must be changed regularly. Nobody likes to do it (except for some fanatics), but it’s a most needed task.
Today, February 1st, is the “International password change Day”, as a reminder and a motivator to do this tedious task.
The process itself doesn’t take more than 1 minute per password. The problem is the generation of a password that is both secure and easily remembered. Here’s the real challenge. As we all know (and are tired to hear/read), the basic principles to keeping a secure password are:
- Use upper case, lower case, numbers and symbols
- Do not include personal data (name, last name, birth date, pet name, children name, etc)
- Do not use “dictionary” words (words that could be found in a dictionary, like “automobile”)
You can read the full article at the Mkit Argentina Blog
One day I went to one of those important coffee shops. I bought my beverage and went to the first floor.
I sat on a chair and on the wall to my right I found a beautiful gift: An RJ45 port.
I immediately took out an Ethernet cable from my bag and connected it to the wall and to my computer, and started looking.
Here is a funny turn of events:
While I was fighting with the port (it didn’t gave me link), a girl that was sitting next to me with her laptop came to me and said:
“Excuse me, but did you know you could log on via Wi-Fi?”
Clearly I didn’t explain what was going on, and simply answered:
To what she answered:
“Yeah, just look for the network called [name-of-the-bar], and hit connect.”
I finally couldn’t connect to the bar’s wired network (the port was physically disconnected from the Switch) but the innocent comment from the girl cheered my afternoon
Mkit Angels and Demons
Defensive security against ofensive security
Continuing with our free training events, we’re proud to present the event Mkit Angels and Demons.
Everything you haven’t seen about IT Security will be analyzed by experts during the event. Well-known professionals from industry, hackers and referents of the field will meet to expose their knowledge and experiences to establish two main perspectives about ITSec in Latin America.
, Seguridad Informatica