PHD 2011 Materials

VoIP security legends and myths

Konstantin Gurzov, Positive Technologies

Head in the Clouds… Can we overcome security fears for cloud computing?

Christopher Gould, PwC

Vulnerabilities in the Systems of Authenticity Control of Digital Photographic Images

Dmitry Sklyarov, Elcomsoft

Zero Day for SCADA

Yury Gurkin, GLEG Ltd.

Automatic search for vulnerabilities in programs without source codes… or introduction into fuzzing

Dmitry Oleksyuk, eSage Lab

Vulnerabilities in Web - difficulties

Yury Goltsev, Information Security Expert, Positive Technologies

Analysis of network infrastructure security

Sergey Pavlov, Positive Technologies

VOIP insecurities workshop

Gleb Gritsai, Positive Technologies

Analysis of SCADA security protection

Andrey Komarov, Stankoinformzaschita Research and Development Center

Conducting Forensic Examination and Analysis of Rootkits (by the Example of TDL4)

Alexander Matrosov, ESET

__________________________________ __________________________________ __________________________________ __________________________________
Copyright © 2011
Positive Technologies