On May 30 and 31, at the Digital October techno center in Moscow, an international forum on practical safety
Positive Hack Days is held , about which everyone has already heard. Registration for the event opened at noon yesterday, and it’s probably very difficult to get there now. Therefore, we first draw your attention to useful information in the Positive Technologies
post .
As for our expectations of the forum, as always, it is difficult to hide the enthusiasm for the composition. Friends, it will be a collision of elements, something cosmic. Perhaps for someone even shock therapy. The main thing is that everyone follows the bright side of the force, and the young talents direct their talents to a peaceful course, and companies correctly ensure the information security of their resources. And we will provide cookies ...

')
Kaspersky Lab at Positive Hack Days traditionally pays attention to highlighting the most topical issues that are becoming more and more sophisticated every year. This year our experts will cover topics such as:
Alexander Gostev: Mystery DuquThe report is dedicated to Duqu, a complex Trojan program that seems to have been written by the creators of the notorious Stuxnet worm. Its main goal is to act as a backdoor in the system, simplifying the theft of private information. This is its main difference from Stuxnet, the main purpose of which was sabotage at industrial facilities.
An analysis of the activities of the victim organizations and the nature of the information that interested Duqu authors leads to the conclusion that the attackers' main goal was any information about industrial production management systems in various industries, as well as about trade relations of a number of Iranian organizations.
A number of signs indicate that the Duqu Trojan virus could exist as early as 2007-2008 in the form of earlier versions, as well as the fact that the Stuxnet worm was created on the basis of a certain platform that was used to create Duqu. Moreover, the development of Duqu and Stuxnet could be conducted in parallel, at the same time.
Vitaliy Kamlyuk: Three recent stories about malware attacks on DBO systemsThis report presents an analysis of three malicious programs that are the most active and high-tech at the moment. The malicious program Lurk is one of the most active and hidden when attacking Russian banks. The SpyEye malware distinguished itself this month by updating the module to monitor user actions via a webcam. Cridex, seen in several large mass mailings, is the latest major competitor for Zeus and SpyEye to attack international banks and RBS systems.
Andrey Duhvalov: Protection of industrial information systems is a factor of human survivalModern civilization unconditionally depends on information systems. Particularly high degree of dependence in the industry. Nuclear and hydroelectric power plants, oil and gas pipelines, national electricity distribution networks, national and world-class transportation systems are facilities controlled by information systems. The protection of automated control systems for facilities that can affect the stability of countries, peoples and continents is a super challenge for IT security specialists.
Now Kaspersky Lab is developing a security system for industrial information systems.
Maria Garnayeva: Methods of inserting sticks in the wheels of the botmasters: the Kelihos botnetKheli Tech and Microsoft, codenamed Operation b79, led to the interception (sinkholing) of the first Kelihos botnet. In March 2012, Kaspersky Lab and the company CrowdStrike disabled the second botnet Kelihos, which its creators began to form immediately after losing the first one. At the heart of both botnets lay the P2P architecture, which previously was theoretically considered invulnerable to Sinkholing.
The presentation will examine the technical features of the sinkholing method with a description of the Kelihos communication protocol, changes in new botnet versions, and explain why sinkholing is a useful action from the speaker’s point of view, but only a temporary solution to neutralize botnets.
Sergey Nevstruev: Practical aspects of mobile securityHow real are mobile threats? Kaspersky Lab experts will show that infection is possible when using completely innocent things, such as Google search or playing Angry Birds. We will also clearly consider the effective technologies for protecting mobile devices.
It is noteworthy that most of the threats to mobile platforms come from Russia.
If you have any leading questions that you would like to ask at the event, you can ask them in the comments so that we can prepare well. :) And if you can’t come, then also ask for topics that interest you - we will try to compensate a little for your absence.