RSS

Khamis, 4 Mac 2010

Evil Access Point Demo

Enjoy!

Rabu, 3 Mac 2010

Web defacement demo

Last multimedia presentation



More will come :)

Selasa, 2 Mac 2010

New List of Speakers with Presentation Title

LIST OF SPEAKERS

Presentation 1
Tuan Hj. Jaafar b. Haji Mohamad Abu Bakar, TM Research & Development.
Title : Network Commercialization

Presentation 2
Dr. Jamalullail bin Abd. Manan, MIMOS Berhad.
Title : The Challenge in Information Security

Presentation 3
Prof. Dr. Kamaruzzaman Seman, Professor of USIM
Title : Security Issues and International Standards in Next Generation Network (NGN).

Presentation 4
En. Nik Azmi bin Nik Omar, CyberSecurity Malaysia.
Title : Smart Card Security Evaluation: MyKAD

Presentation 5
En. Mohammad Muslim, EC Council Academy
Title : Ethical Hacking








Sabtu, 27 Februari 2010

KTM Komuter Map


If any participants are using public transports from KL Sentral or Seremban you may head towards Nilai Komuter Station. Then, fetch taxi to USIM Campus. Any inquiry please feel free to email us. Thanks.

USIM's Location

Rabu, 24 Februari 2010

Selasa, 23 Februari 2010

ISAS 2010's Poster

Speakers

For your information, Mr.Azhar from IMPACT Alliance could not attend the seminar. His place will be replaced by Lt. Kol. Asmuni Yusof from Cyber Security Malaysia.

The new list of the speakers :

1. DR. JAMALULLAIL ABD. MANAN

(Malaysian Institute of Microelectronic Systems (MIMOS))


2. DR. SABRI BIN TUAN MAT

(Crypto Group, Ministry of Defense Malaysia)


3. TUAN HJ. JAAFAR

(Telekom (TM) R&D)


4. PROF. DR. KAMARUZZAMAN SEMAN

(Lecturer, Universiti Sains Islam Malaysia)


5. LT. COL. ASMUNI YUSOF
(Cyber Security Malaysia)


Sabtu, 20 Februari 2010

List of Speakers

SPEAKERS:


1. DR. JAMALULLAIL ABD. MANAN

(Malaysian Institute of Microelectronic Systems (MIMOS))


2. DR. SABRI BIN TUAN MAT

(Crypto Group, Ministry of Defense Malaysia)


3. TUAN HJ. JAAFAR

(Telekom (TM) R&D)


4. PROF. DR. KAMARUZZAMAN SEMAN

(Lecturer, Universiti Sains Islam Malaysia)


5. MR. AZHAR
(Impact Alliance)

- Any changes of speakers will be inform in future.

Theme for The Seminar

"Security in Future Generation Network"

How the future would be? The increasing of threats towards our network nowadays should be taken into our consideration. New method of defense should be developed periodically in order to cope with the threats existed. While attack methods and tools have become more and more powerful, interest has greatly increased in the field of building, active and smart defend system.

ISAS 2010 will make such an amazing exploration about the topic and that is the concrete reason why you should stay with us!!

Sabtu, 16 Januari 2010

The Best Defence Is Information

"The strongest case for information disclosure is when the benefit of releasing the information outweighs the possible risks. In this case, like many others, the bad guys already won. Exploits are already being used in the wild and the fact that the rest of the world is just now taking notice doesn't mean that these are new vulnerabilities. At this point, the best strategy is to raise awareness, distribute the relevant information, and apply pressure on the vendor to release a patch."
—H D Moore

Information is power.... One that control information control the world

Antivirus - updated
Firewall - activated
IDS/IPS - bought
Vulnerability - patched
Your Brain - ????


Cyber threats such as spyware,scareware and trojan are no longer targeting your computer... They are targeting YOU

Personal information like financial standings, contact information, social activities are been gathered by unwanted criminals.

The best defence is information. Information is free - you need to know.

How to protect your identity and privacy? You maybe sharing your phone number,personal activities,hobby,surfing habits to other people that you DO NOT want to share with without realizing it? Web 2.0 has bring social interfaces to Net users for free with a high price - PRIVACY THREATS

PRIVACY THREATS

Phishing

Scareware

Drive-by malware download using XSS attack

Low privacy and security setting in social networking sites provider —You 'mistakenly' shared information that you do not want to share to anybody to EVERYBODY

SEO attack

Javascript attack with PDF

Clickjacking

Browser exploits

"Weak password"

Don't forget to visit our Facebook page here.