Threat Level Blogging from ToorCon9

We’ll be blogging from ToorCon9, the annual hackers conference in San Diego, starting Saturday – if we can find a secure network. It’s the ninth time these folks gathered in San Diego on the bayfront and stayed indoors to play white hats v. black hats, and they’ve got another interesting line-up. We’re looking forward to […]
Image may contain Building Architecture Tower Banister and Handrail

Venue3 We'll be blogging from ToorCon9, the annual hackers conference in San Diego, starting Saturday - if we can find a secure network. It's the ninth time these folks gathered in San Diego on the bayfront and stayed indoors to play white hats v. black hats, and they've got another interesting line-up.

We're looking forward to hearing from Charles Miller, whose outfit may've be the first to hack the iPhone back in July by using fuzzing to find the phone's fatal code flaw. What happens when you fuzz and find not a single flaw, he wonders. Does it mean the perfect code has at last been written?

Travis Goodspeed, more than just a pretty name, will talk about his research into how to use a little packet to sneak a bigger chunk of code into unallocated memory. "One should never assume that an embedded platform is safe from a sophisticated injection behavior because of the limitations imposed by a datagram networking framework, such as 802.15.4," he writes on his blog - noting that the backbone of medical, military and industrial automation technology seem to be relying on that assumption.

And we'll blog talks by Dan Kaminsky and Jay Beale, who has wondered what happens when so many of your clients become infected that they can be considered your servers' attackers.

And of course, we'll scrounge for food, drinks and schwag - with sponsors like Microsoft, Pico Computing, Nomad Mobile Research Center and so on, the getting should be good.