So Defcon 18 is in the works and coming up this summer.
What is Defcon? Its a Hacking Community to put it short (not all hacking is bad there are white collar hackers). Alot of IT ppl there looking for information and new security issues. Anyways check out their site (clicky the logo)
So anyone intrested in going? I plan to be there with my oldest (who will be 18 at that point). My oldest is into playing on computers like mom does. Here is the info for it:
Meetings - Convention
Friday, July 30, 2010 at 10:00am
Sunday, August 1, 2010 at 6:00pm
The Rivera Hotel and Casino
Las Vegas, NV
What: DEF CON 18 Call For Papers
When: The Call for Papers will close on June 1, 2010
How: Complete the Call for Papers Form and send to talks at defcon dot org
DEF CON will take place at the Riviera in Las Vegas, NV, USA, July 30 - August 1, 2010.
From radioactive boy scouts, hardware hacking, privacy enhancing technology, reverse engineering, forensics, web app attacks and more DEF CON is all about thinking differently and showing off what you have been working on. We will sort presentations by subject matter and come up with topic clusters of similar interests. It worked out so well in the past we are doing it again this year.
What are we looking for then, if we don't have tracks? We are looking for the presentation that you've never seen before and have always wanted to see. We are looking for the presentation that the attendees wouldn't ask for, but blows their minds when they see it. We want strange demos of Personal GPS jammers, RFID zappers, and HERF madness. Got a MITM attack against cell phones? We want to see it.
Here is the long form: Subjects that we have traditionally covered in the past, and will continue to accept include: Trojan development, worms, Malware, intelligent agents, protocol exploits, application security, web security, database hacking, privacy issues, criminal law, civil law, international law/treaties, prosecution perspectives, 802.11X, bluetooth, cellular telephony protocols, privacy, identity theft, identity creation, fraud, social implications of technology, media/film presentations, firmware hacking, hardware hacking, embedded systems hacking, smartcard technologies, credit card and financial instrument technologies, surveillance, counter-surveillance, UFO's, peer2peer technologies, reputation systems, copyright infringement and anti-copyright infringement enforcement technologies, critical infrastructure issues, physical security, social engineering, academic security research, PDA and cell phone security, EMP/HERF weaponry, TEMPEST technologies, corporate espionage, IDS evasion.
What a mouth full! Well you can't say we didn't give you some ideas. This list is not intended to limit possible topics, merely to give examples of topics that have interested us in the past, and is in fact the same list we used last year..
Check out https://www.defcon.org/html/defcon-17/dc-17-speakers.html for past conference presentations to get a complete list of past topics that were accepted if you want to learn from the past.
We are looking for and give preference to: unique research, new tool releases, Ø-day attacks (with responsible disclosure), highly technical material, social commentaries, and ground breaking material of any kind. Want to screen a new hacking documentary or release research? Consider DEF CON.