Wednesday 3 October 17:00 - 17:30, Green room
Amit Serper (Cybereason)
This is the talk that adware makers don't want you to attend because it exposes the seedy world of adware and teaches you what to do when adware companies threaten you with legal action.
In 2016, I reverse engineered OSX.Pirrit. TargetingEdge, the company behind the program, claimed it was adware but it had more in common with malware, including the ability to run root privileges and hijack an infected Mac's HTTP traffic.
Adware and legal scare tactics make the jobs of security professionals even more difficult. One jeopardizes user and company security and the other can stymie important research. This session will tackle both issues. Attendees will learn the risks that adware poses through the technical analysis that was performed, how to protect Mac from security threats, and why solid research is the best defence against legal threats from companies that develop predatory software.
Amit leads the security research at Cybereason's Noctornus group in the company's Boston HQ. He specializes in low-level, vulnerability and kernel research, malware analysis and reverse engineering on Windows, Linux and macOS. He also has extensive experience researching, reverse engineering, and exploiting IoT devices of various kinds. Prior to joining Cybereason four years ago, Amit spent nine years leading security research projects and teams for an Israeli government intelligence agency, specifically in embedded systems security (or lack of).
Simon Forster (Spamhaus Technology Ltd)
Lotem Finkelstein (Check Point)
Aseel Kayal (Check Point)
Wendy Nather (Duo Security)