Tag Archives: security

TiE Pune “My Story” Session with Kailash Katkar, CEO of Quickheal – 5 May

TiE Pune presents a “My Story” session with Kailash Katkar, CEO and Founder of Quickheal, one of Pune’s major success stories in software products on 5th May, 6pm, at MCCIA, ICC Towers, SB Road.

About the speaker – Kailash Katkar

Kailash Katkar is the founder and CEO of Quickheal Technologies, India’s leading provider of Internet Security tools and is a leader in Anti-Virus Technology in India. Starting his career as a radio repair technician, Sanjay created Quickheal, a highly successful software prduct company from our very own Pune that had 09-10 revenue in excess of Rs 100 Cr.

In addition to hearing the jingles of Quickheal on FM radio, we have read about Quickheal recently when Sequoia Capital, leading VC investd Rs60 cr in Quick Heal some six months ago. Quick Heal Technologies has established Quick Heal product family as industry benchmark for computer security.

Quick Heal, an award winning security product is installed in corporate, small business and consumers’ homes protecting their computers from viruses and other malicious threats. Serving millions of users worldwide, Quick Heal Technologies employs more than 350 people in eighteen branch offices and is headquartered at Pune, India.

Quick Heal Technologies has firmly established its position in India and also operates through a network of dealers and channel partners in more than 50 countries worldwide.

About TiE Pune My Story

“My Story – Inspiring Journey of an Entrepreneur” This program is created to celebrate entrepreneurship and bring stories from successful entrepreneurs in their own words. The invited speakers will share their entrepreneurial journeys and talk about lessons learned, mistakes they wish they avoided, and key decisions that helped make their venture successful.

Fees and Registration

The event is on 5th May, from 6pm to 8pm, on the 5th Floor, MCCIA, ICC Towers, SB Road. This event is free and open for anybody to attend. Please register here

SOAP Security; Linux Security Gateway – Nov 13

'null' the "open" security community presents an event on Nov 13, 4:30pm at SICSR Model Colony.

Details are as follows:

Talk: SOA architecture and SOAP protocol architecture detail and attack Vector by Nabarun sengupta

Brief Description of Talk:
Will discuss on what are web services? How SOA architecture came into existence? The SOA architecture came forth with the concept of SOAP protocol and WSDL files. We will see the communication between them. Then some aspects on attacker’s approach will be highlighted. Eventually it will end with a video demonstration of an web service attack on WSDigger through WSKnight open source tool.

Talk: How to convert your linux box into Security Gateway – Part 1 by Murtuja Bharamal

Brief Description of Talk:
In this talk I will cover various security feature/daemon of Linux OS either comes by default of with OS or available for downloads, like Firrewall, Proxy, IDS/IPS, VPN, Antivirus How to configure and use this feature to convert linux box into Security Gateway as per requirement.
In part-1 I will start-with Basic Linux Hardening and IPTables Firewall.

About null

null is an open security community for ethical hackers, security professionals and security enthusiasts. It is free, and anybody can join.

null was born out of a need for:

  • Promoting advanced security research.
  • Spreading security awareness among the netizens.
  • A Centralized knowledge base for security related information.

It was founded by Aseem Jakhar in Jan 2008.

Vision

Move towards immunity from security.

Mission

  • Advanced security research.
  • Create a disclosure platform.
  • Design/Develop innovative solutions to combat current/emerging threats.
  • Define a “Must-Have” security knowledge-base for different roles (programmer, QA, admin, end user).
  • Spread security awareness.
  • Organize Meetings/Conferences/Trainings/Awareness camps.

2 Security Conferences Call for Papers: ClubHack (with Bruce Schneier!) & nullcon (Goa!)

The call for papers for two interesting security conferences has just been announced, and as usual, PuneTech is trying to encourage its readers to make submissions to the conferences. As indicated in an earlier post, PuneTech does not promote paid conferences, but we’re happy to promote the call for speakers for these conferences, because, for selected speakers, the conferences is free :-).

Bruce Schneier at CFP 2007: Open panel on Net ...
World famous security researcher Bruce Schneier is expected in Pune for ClubHack2010 in December. Image via Wikipedia

The first of these conferences is ClubHack 2010, which will be in December 2010, and will feature world famous security expert Bruce Schneier, and the second one is the nullcon dwitiya which is actually in Goa (but is featured in PuneTech because null started in Pune, and is still a largely Pune-driven group).

ClubHack 2010

ClubHack2010 is expecting a deep knowledge technical presentations/demonstrations on topics from the world of Information Security. These presentations are expected to be of 40 minutes each. The schedule time for each presenter would be 50 minutes out of which 40 minutes are for the presentation & 10 for the question-answer sessions.

Indicative list of Topics for ClubHack2010

The following list of topics is made keeping in mind the most interesting topics in hacking & security. This is more of an indicative list, the papers submission can be on other topics also but have to be close to this & the theme of the event.

  • Protocol / Application based vulnerability in networks and computers
  • Firewall Evasion techniques
  • Cloud Application Security
  • Data Recovery and Incident Response
  • Mobile Security (cellular technologies)
  • WLAN and Bluetooth Security
  • Analysis of malicious code
  • Cryptography and Cryptanalysis
  • Computer forensics
  • Cyber warfare
  • Open source hacking toolkit
  • Cyber Crime & law
  • Hardware mods

Important dates for ClubHack2010

Click on logo for PuneTech wiki page on ClubHack
Click on logo see all PuneTech articles about ClubHack
  • Abstract Submission: 30th October 2010
  • Announcement of selected papers: 5th November 2010
  • Full Paper Submission: 15th November 2010

Speaker Benefits for ClubHack2010

  • Economic Return Ticket â from your nearest international airport to Pune
  • Accommodation (upto 4 days)
  • Local Tourism package (in Sahyadri Ranges, Western Ghat)
  • One extra ticket for the event
  • No other expenses as ClubHack is a not-for-profit group & finding sponsors in India is tough 🙂

More details for ClubHack2010

See the ClubHack2010 call for papers for more details

nullcon dwitiya

Click on the NULL logo to see all PuneTech articles about NULL
Click on the NULL logo to see all PuneTech articles about NULL

null is a security community that started in Pune, and is now very active in a number of cities in India, including Bangalore, Delhi, Bhopal, etc. They have monthly meets and regular security awareness camps in various Institutions and Organizations, and they also hold an security conference in Goa every year. null describes itself as

We are a bunch of security phreaks who like to share our technical expertise and hacking skills with each other and spread awareness among the common people about the good, the bad and the ugly side of computers and technology. We believe that sharing the right technical knowledge leads to expertise and innovation and that is what we strive to do in our meets and events.

nullcon dwitiya is the second annual null conference, and will be in Goa in Feb 2011. They are soliciting research done by the community as paper submissions for nullcon. Submissions are expected in 4 tracks:

  • Bakkar: 1 Hr Talks
  • Tez: 5-30 min Talks
  • Karyashala: 2-4 Hrs Workshop
  • Desi Jugaad (Local Hack): 1 Hr

Submission Topics for nullcon dwitiya

For “Desi Jugaad” (Local Hack) nullcon is looking for submissions of any kind of local hacks that you have worked on (hints: electronic/mechanical meters, automobile hacking, hardware, mobile phones, lock-picking, bypassing procedures and processes, etc, Be creative :-D)

For the more traditional papers, the indicative domains are:

  • Hardware (ex: RFID, Magnetic Strips, Card Readers, Mobile Devices, Electronic Devices)
  • Tools (non-commercial)
  • Programming/Software Development
  • Networks
  • Information Warfare
  • Botnets, Malware
  • Web
  • New attack vectors
  • Mobile, VOIP and Telecom
  • VM
  • Cloud
  • Critical Infrastructure
  • Satellite
  • Wireless
  • Forensics

Important dates for nullcon dwitiya

  • CFP End Date: 30th November 2010
  • Speakers List Online: 10th December 2010
  • Conference Dates: 25th â 26th February 2011

Speaker Benefits for nullcon dwitiya

Speaker benefits are available for selected speakers in the “Bakkar”, “Desi Jugaad” and “Karyashala” tracks:

  • Free Accommodation for 3 nights
  • Travel (One way or Return depending on the Sponsorships 🙂 )
  • Free access to the conference.
  • Invitation to Mehfil-E-Mausiqi (null party)

More details for nullcon dwitiya

See the nullcon dwitiya call for papers for more details.

Enhanced by Zemanta

Ajit Shelat, 1 Sept 2010

(Pune based serial entrepreneur, Ajit Shelat, passed away yesterday. This article and photo are by flickr user drona and are taken from this page. They’re reproduced here under the terms of the Creative Commons (BY-NC) license under which that page is published.)

Ajit Shelat

My friend Ajit Shelat passed away today. He was driving on the Mumbai-Pune Highway, and had an accident at about 530pm September 1, 2010.

He was a fellow alumnus and contemporary of IIT-Mumbai.

Trained entirely in India, he was perhaps the first Indian engineer who designed and developed a very complex LAN security chipset at Nevis Networks, entirely based out of Pune, India.

He was a co-founder of RIMO technologies, Switch-on Networks(with Moti Jiandani), and Nevis Networks. Switch-On Networks was sold to PMC-Sierra for $300M+.

He supported a wide variety of environmental causes and an avid hiker and naturalist. A prolific entrepreneur himself, he generously gave his time and money to his favorite causes: The environment, education and entrepreneurs.

Said Yatin Mundkur, a venture capitalist at Artiman Ventures, who used to work for Ajit at Godrej Industries, in the mid-eighties: “I am who I am today, because of Ajit. And a lot of us who reported to him at Godrej would gladly say that.”

I will fondly remember the many hikes I took with him, and particularly the many discussions I had with him during the early X Window System days.

He is survived by his wife Radha Shelat and daughter Arundhati, and mother and sister.

drona

(Ajit Shelat was most recently the President and CEO of Nevis Networks, a company that he was trying to turn around after he and his partners had acquired the assets of the company from the previous investors. PuneTech had interviewed Ajit just before this. He is survived by his wife, Radha Shelat, (VP Engineering, and India MD of Librato, previously CTO of Symantec Pune & Veritas Pune), and daughter.)

Enhanced by Zemanta

Safe Surfing, Safe Parenting: Security Awareness lecture by Rohit Srivastwa – 26 June

What: CSI Pune workshop on ‘Safe Surfing, Safe Parenting’ by Rohit Srivastwa
When: Saturday, 26th June, 3pm-6pm
Where: K.B. Joshi Hall, Cummins College of Engineering, Karve Nagar, Pune.
Registration and Fees: This event is free for all. Register here

Click on the logo to see all PuneTech posts about CSI Pune
Computer Society of India, Pune Chapter, is one of the oldest technology user groups that is still active. Click on the logo to see all PuneTech posts about CSI Pune

Safe Surfing, Safe Parenting

This workshop by security evangelist Rohit Srivastwa aims:

  • Create awareness among the society at large about the social threats hidden in uncontrolled access to internet
  • show how parents can inculcate safe internet habits in their children and how they can monitor for any unwanted activities by children.
  • show children as to how they should refrain from the internet sites which are tempting but not safe for their age / level of knowledge.

This event is sponsored by Symantec Corporation.

Update:
The slides used by Rohit are now available online:

Click here if you don’t see any slides above.

About the Speaker – Rohit Srivastwa

Rohit is a well known security evangelist, having an expertise in hacking, cyber crime investigation and IT infrastructure management.

He is actively involved in advising and assisting several military agencies, law enforcement personnel, media, corporate and Government bodies. He provides coaching and training to the Police department of Pune, Mauritius and Malaysia on the related subjects. He is also a visiting faculty at Asian School of Cyber Laws, Symbiosis and many other institutes.

Rohit is also the founder of ClubHack, a community to provide a platform to the security experts across the globe to come together, and to spread security awareness amongst laypeople.

Apart from ClubHack Rohit has been involved in many large scale projects in the field of IT infrastructure management & security. In his last assignment Rohit was Director Technology at Commonwealth Youth Games (2008) where he headed the technology division and delivered the complete technology of games. After that he was Director Technology and Network Operations for Commonwealth Games Delhi (2010).

CSI Pune Lecture: How to protect yourself from online fraud – 24th April

What: CSI Pune lecture “Business in the Dark and how can we protect ourselves: Case of Online frauds” by
When: Saturday 24th April, 2010, 6pm
Where: 7th Floor, Symbiosis Institute of Computer Studies and Research, Atur Centre, Model Colony. Map.
Registration and Fees: Free for CSI members, Rs 100 for others. Register here

Click on the logo to see all PuneTech posts about CSI Pune
Click on the logo to see all PuneTech posts about CSI Pune

Online Frauds – Details

Online frauds have increased multiple folds in couple years. It has become big headache for all viz. Banks, Law enforcement and we as end users. To protect ourselves we need to know how these fraudsters work. This session will cover these aspects and simple steps that we need take to reduce the probability of such frauds to succeed.

  1. What are frauds?
  2. How online frauds work?
  3. Phishing and Trojans
  4. Man in the Browser Attacks
  5. Future of frauds
  6. Let’s do our bit: How can we protect?

Who should attend

Any individual who is doing on-line transactions or interested in knowing how to protect oneself from cyber crimes, Students, Users, Security / network / data base administrators, auditors and fraud examiners, chief risk officers, Those seeking career in computer forensics and cyber crime investigation., Senior, Mid Level and Operational Management and staff, Professionals, Consultants

About the Speaker – Parag Deshpande

  • Parag is principal eGRC consultant with RSA Security a leading security company in the world.
  • He has over 14 years of experience during which he advised financial services, manufacturing, and telecom sector clients across the Globe including India, USA, Australia and UK.
  • He is Bachelor of Technology from Laxminrayan Institute of Technology, Nagpur and Masters is Business Administration from Symbiosis, Pune.
  • Exposure to business processes, technology architecture and IT risk management has made him leading consultant for Secure Business Enablement
  • He has handled various aspects of the services business, including consulting, delivery, practice management, presales and account management.
  • Apart from professional activities he is interested and does volunteering work to create awareness about Cyber Security Risks.

ISACA Pune Monthly Meet: Risk Assessment by Dr. Pramod Damle – 16 Jan

What: ISACA Pune meet. Risk Assessment by Dr. Pramod Damle
When: Saturday, 16th January, 6pm-8:30pm
Where: Damle Hall, Behind IndSearch Institute, Off Law College Road, Shivajinagar
Registration and Fees: Free for all to attend. No registration required

ISACA is a worldwide association of Information Security professionals dedicated to the audit, control, and security of information systems. Click on the logo to see other PuneTech articles related to ISACA.
ISACA is a worldwide association of Information Security professionals dedicated to the audit, control, and security of information systems. Click on the logo to see other PuneTech articles related to ISACA.

Risk Assessment

Risk Assessment (RA) is an integral part of information security program for any organization. It presupposes business impact analysis and embraces all the major assets/ operations. The RA process consists of a detailed study of the threats and vulnerabilities and the resultant exposure the organization faces. It opens the choices of risk treatment (RT) like mitigation, acceptance, transference etc. Hence, a successful RA focuses the limited resources of an organization on the proper risk treatment and thus brings down the residual risk to the level of acceptable risk, thus in turn paving way for the information security governance.

About the Speaker – Dr. Pramod Damle

Dr. Damle is a freelance adviser, evangelist and researcher in information security governance, and has been a member of ISACA, Pune chapter from 2000. For the past 25 years, he has been balancing his IT career between practice and preaching. On the one hand he has contributed to IT missions of MNCs like State Bank of India, Oil India Ltd, Parametric Technologies, L&T, etc., while on the other hand he has been catering to academia like IIMs, IGNOU, Pune university, Symbiosis, etc. at PG/ Doctoral level. He also teaches several IT certification programs of ISACA, ISC2, ISO, QAI. Earlier Dr. Damle worked as IT manager at Bank of Maharashtra, Director at MODVIN, Professor and IT Head at YASHADA and head of education services at MIEL, where he architected one year full-time post-graduate program in information security management (PRISM) that is being run domestically and abroad.

With articles/ research papers for ‘Control’, Computers Today, etc. and a few IT books to his credit, he has designed a series of PC-based games on serious IT topics. Dr. Damle has earned various degrees in Maths, Laws, Commerce, Computers and professional certifications like ISO9001 Tick IT Lead Auditor, ISO27001 Lead Auditor, CAIIB, CISA, CISM, CISSP, SSCP, CSSLP, GIAC GSLC, PMP and PhD in information security.

ISACA meet: Understanding Wi-Fi Security Fundamentals by Hemant Chaskar – Sat, 14 Nov

Wi-Fi logo
Image via Wikipedia

What: ISACA Pune meet. Understanding Wi-Fi Security Fundamentals by Dr. Hemant Chaskar
When: Saturday, 14th November, 6pm-8:30pm
Where: College of Agricultural Banking of Reserve Bank of India on University Road, Shivajinagar
Registration and Fees: Free for all to attend. No registration required

Details

Dr. Hemant Chaskar is a domain expert in WiFi security.

He holds Ph.D. in Electrical and Computer Engineering from University of Illinois at Urbana-Champaign, USA. Hemant is also anchor for Pune chapter of Data Security Council of India (DSCI).

He has more than 10 years of experience in security, networking and telecommunications industry in USA and India.

For last 5 years, he has extensively worked on WiFi networking and wireless security. Currently, he is Director of Technology at AirTight Networks, which is a global leader in WiFi security and performance management products and solutions.

See the ISACA Pune website for more information about ISACA.

Reblog this post [with Zemanta]

NULL security forum meeting on “Malware Analysis” and “Bypassing Catpcha/Crpyto”

What: Meeting of the NULL security usergroup featuring talks on Malware analysis and an Open mail relay bypassing captcha and crypto
When: Saturday, 31 Oct, 5pm
Where: SICSR, Model Colony
Registration and Fees: This event is free for all to attend. No registration required
Link: Null Blog

Click on the NULL logo to see all PuneTech articles about NULL
Click on the NULL logo to see all PuneTech articles about NULL

Introduction to Malware Analysis

By DaH4cker

A short presentation on the techniques & tools used for malware analysis followed by a live example. I will be showing behavioral analysis approach which includes setting up a inexpensive, flexible environment & tools required for understanding inner-workings of malware.

Automated open mail relay, bypassing Captcha and Crypto

By Aseem Jakhar

Case study of an ironic web implementation.

Reblog this post [with Zemanta]

ISACA Monthly Meet: Q and A on Information Technology Law in India

The Pune Chapter of ISACA (Information Systems Audit and Control Association) presents their monthly meeting, in which they have a Questions and Answers session with Pavan Duggal, Chairman ASSOCHAM Cyberlaw Committee, an advocate of the Supreme Court of India, and President of Cyberlaws.net.

What: Q&A session with Pavan Duggal
When: Saturday, 10th October, 6pm-8:30pm
Where: SICSR, 4th floor
Registration and Fees: Free for all to attend. No registration required

Pavan has been associated with the Ministry of Communication and Information Technology, Government of India on Cyberlaw and Electronic Governance legal issues. While a practicing Advocate, Supreme Court of India, Pavan Duggal has made an immense impact with an international reputation as an expert and authority on Cyberlaw and E-Commerce law.

Reblog this post [with Zemanta]