Cork|Sec 149
Details
Running since June 2013, every month we have 1-2 talks focused on Security or Technology - followed by socialising with like minded people
- You can find out exactly what to expect about the night and the venue on the What We're About section of our Meetup page. Past talk details can be found the "Past Events" section.
 - All people with any sort of an interest or level of knowledge in Security, Hacking and Emerging Technology are more than welcome to attend and feel free to bring like minded colleagues and friends.
 
CorkSec is made possible through generous sponsorship from our Platinum Sponsor Trend Micro, Gold Sponsor CyberSkills , as well as our Silver and Bronze Sponsors featured prominently on the night.
Our talks come from our community so if you have an idea for a topic (anything for 10-60 minutes) please email us at **DefconCork@gmail.com** . Whether you are an experienced presenter, or presenting for your first time - CorkSec is a great venue for it - and we are happy to help you prepare and mentor you.
Doors open at 19:00 with talks starting at 19:15. Talks below
TALK 1: Hidden Networks: How Residential Proxies Fuel Cybercrime and Evolve Bulletproof Hosting by Fyodor Yarochkin
Criminals today leverage residential proxies for a variety of reasons. In this talk we’ll investigate the role of residential proxies in modern cybercrime and how bulletproof hosting evolved into diversified services with residential proxies being one of them. In this session we look into how modern residential proxy services meet some of the requirements of what bullet proof hosting services used to traditionally cover. We’ll illustrate how residential proxy providers operate by examining their infrastructure and how proxy nodes are acquired.
From our investigations it's clear that many of the nodes in the network are being sold without awareness or acknowledgement of the device owners. We examine what techniques these residential proxy providers use to ensure that the device owners are not aware (or less impacted) by the use of their IP addresses for residential proxy services, and what mechanisms allow them to continue their business operations. Finally, we examine what techniques can be used to identify residential proxy infrastructure and examine the possibilities of residential proxy traffic fingerprinting. We also discuss some of the weaknesses in the infrastructure of residential proxy providers that can allow defenders to effectively identify and map their current infrastructure.
TALK 2: Digital Childhood – Lost Play, New Dangers? by Lajos Záhonyi
Smartphones, social media, and kids’ safety – a hot topic worldwide. Italy has already banned phones in schools, Hungary regulates them by law, and Denmark is preparing a full ban. Psychologist Jonathan Haidt warns: no smartphones before 14, no social media before 16.
But what about our families and schools? How can parents, teachers – and even the state – play a role in protecting children in the digital age?
This will be a thought-provoking talk by Lajos Záhonyi, researcher at Óbuda University, Budapest, and visiting researcher at the MTU Chair of Cybersecurity.
Let’s discuss together how to shape a safer digital childhood.
