From The Sip Trunking Experts

TMCNet:  Accuvant Security Experts Set to Present at Black Hat USA 2013 in Las Vegas

[July 31, 2013]

Accuvant Security Experts Set to Present at Black Hat USA 2013 in Las Vegas

DENVER --(Business Wire)--

Accuvant, the Authoritative Source (News - Alert) for information security, today announced that several members of its renowned Accuvant LABS team are presenting at Black Hat USA 2013. The conference will be held from July 27 through August 1 at Caesars Palace in Las Vegas.

Hiding @ Depth - Exploring, Subverting and Breaking NAND Flash Memory

Who/Topic:           Josh Thomas, Accuvant research consultant, will discuss the NAND-Xplore project, which is an attempt to investigate just how deep files can be hidden on an embedded system. He also will talk about how remote NAND manipulation can brick devices beyond repair, from smartphones to SCADA, and how this vulnerability cannot be realistically patched or fixed.
When/Where: Wednesday, July 31 at 5:00 p.m./Augustus 1 and 2

Pass-The-Hash 2: The Admin's Revenge

Who/What: Alva "Skip" Duckwall, Accuvant senior consultant, will co-present some of the shortcomings in Microsoft's (News - Alert) guide for mitigating Pass-The-Hash attacks against Windows, and offer practical ways to detect and potentially prevent hashes from being passed on a network.
When/Where: Thursday, August 1 at 10:15 a.m./Roman 4

Teridian SoC Exploitation: Exploration of Harvard Architecture Smart Grid Systems

Who/What: Josh Thomas and Nathan Keltner, Accuvant senior research consultant, will quickly cover Harvard architecture and system overviews then dive into exploitation scenarios with techniques to attack Harvard architecture systems and code security implementations. Endpoint state results include pathways to gain coveted binary images of firmware and resident code execution.
When: Thursday, August 1 at 5:00 p.m./Roman 1 and 3

Several Accuvant LABS experts also will be presenting 15-minute sessions at the Accuvant booth: #309:

Teridian SoC Exploitation Teaser

Who:           Josh Thomas and Nathan Keltner
When: Wednesday, July 31 from 11:20 a.m. - 11:35 a.m.

Fuzzer Development

Who: Pete Morgan, Accuvant practice manager, funded research
When: Wednesday, July 31 from 3:15 p.m. - 3:30 p.m.

Android (News - Alert) Security Notes

Who: Zach Lanier, Accuvant senior research consultant, and Joshua Drake, Accuvant practice manager, research and development
When: Wednesday, July 31 from 4:40 p.m. - 4:55 p.m.

Pass-the-Hash Q&A Follow-Up

Who: Skip Duckwall
When: Thursday, August 1 from 11:20 a.m. - 11:35 a.m.

DEF CON Malware Teaser Presentation

Who: Josh Thomas
When: Thursday, August 1 from 3:15 p.m. - 3:30 p.m.

Accuvant LABS, the largest and most skilled team of information security professionals in the world, is comprised of respected information security veterans, established thought leaders, sought out speakers and published authors. Each of our 250+ leading security experts is committed to performing research, developing solutions and working with clients - and one another - to solve specific security problems as well as those of the industry at large.

Media wishing to interview any Accuvant experts are encouraged to contact Susan Vaillancourt at or (603) 459-8906.

About Accuvant

Accuvant is the Authoritative Source for information security. Since 2002, the company has served more than 5,200 clients, including half of the Fortune 100 and more than 900 educational institutions and government entities. Headquartered in Denver, Accuvant has offices across the United States and Canada and has the largest and most skilled team of technical security professionals in the world - Accuvant LABS. For more information, please visit

About Black Hat

Black Hat provides briefings and training to leading corporations and government agencies around the world. Black Hat differentiates itself by working at many levels within the corporate, government, and underground communities. This unmatched informational reach enables Black Hat attendees to be continuously aware of the newest vulnerabilities, defense mechanisms, and industry trends. Black Hat Briefings and Trainings are held annually in Abu Dhabi, Amsterdam, and Las Vegas. Black Hat is produced by UBM Tech. More information is available at

[ Back To SIP Trunking Home's Homepage ]

Subscribe here for your FREE
SIP TRUNKING enewslettter.

Featured Partner

Featured Whitepapers

SIP Security for the Enterprise
Voice over IP (VoIP) is incorporated into a variety of computer networks, both public and private, and used for everyday transactions and communications among carriers, businesses, government agencies...

Making A Broadband Purchase Decision
Businesses today have many options for broadband connectivity. Clarifying your particular business needs prior to selecting a broadband provider will ensure an optimal match of broadband service to your requirements.

Voice-Optimized Network Delivers Premier Call Experience
Customers equate call quality with business quality. Real-time communication, interpersonal interaction, and the cordial tone of a call center representative can create a positive impression of your business that no email can match.

Featured Case Studies

Business Telecom Expenses Reduced 50%
A small to medium sized company in the midwest was interested in migrating to IP Communications, but in today's economy, they were hesitant to upgrade their communication system due to their perception that the cost would outweigh the benefits.

Multi-State Company Cuts Telecom Costs 50%
A multi-site, multi-state company with extensive monthly long distance fees and toll-free charges did not have adequate broadband for Broadvox SIP Trunking requirements, nor did they have a SIP enabled telephone system.

Discover Leisure Connects Remote Users to its IP-PBX
Discover Leisure is one of the largest resellers of caravans and motor homes in the UK. With 15 branch of?ces all over the country, the company spent a great deal of money every month just on internal phone calls.

Featured eBOOKS

Internet+: The Way Toward Global Unified Communication
Connecting the telephony of the enterprise PBX or Unified Communications (UC) system using SIP trunks instead of conventional telephone lines has been very successful in recent years.

What is SIP Trunking? Edition 2
SIP trunking is becoming more of a focus for service providers. One key issue many service providers face when deploying SIP trunks is NAT, or Network Address Translation, traversal.

What is SIP Trunking? Edition 1
A vast resource for information about all things SIP - including SIP, security, VoIP, SIP trunking and Unified Communications.

Featured Videos

Broadvox VAR Testimonial VAR 1:
Part 1 of the VAR (Value Added Reseller) Partner Program Testimonials for Broadvox...

E-SBCs AS The Demarcation Point:
Ingate's Steve Johnson talks to Erik Linask about the role session border controller plays as the demarcation point at...

Demystifying DPI
How can deep packet inspection protect your SIP traffic as well as your entire network?

Featured Resources

Partner Program Overview:
Over 4,000 VARs, Master Agents, Solution Providers, and Independent IT Professionals trust Broadvox. We offer customized services and solutions to fit seamlessly into any company's business model. And when you partner with Broadvox, every member of our team stands behind you and your customers 100%...

SIP Trunk UC Summit

What's New

Presenting the New Ingate/Intertex Website:
Internet+ is an extended Internet access allowing high quality SIP (Session Initiation Protocol) based real-time person-to-person communication, everywhere and for any application. It applies to both fixed and mobile networks ...

Featured Blogs

Featured Webinars

Secure SIP Trunking:
What You Need to Know

Successfully Deploying Enterprise SIP Trunking:
Tools and Techniques for Overcoming Common Roadblocks

Featured Podcasts

Getting the Most Out of Your SIP Trunks:
Ingate's Steve Johnson and TMC's Erik Linask discuss how best practices forgetting the most out of SIP Trunking services and common pitfalls to avoid.

Featured Datasheets

Ingate SIParator E-SBCs
Adopting SIP is a simple process with the Ingate SIParator, the secure enterprise session border controller (E-SBC). The SIParator makes secure SIP communications - including VoIP,SIP trunking and more - possible while working seamlessly with your existing network firewall.

Ingate Firewalls
Everyone is talking about enterprise usage of VoIP, instant messaging and other types of realtime communications including presence and conferencing.

SIP Trunk Solutions for Service Providers
The award-winning Ingate Firewall and Ingate SIParator deliver a high quality, reliable SIP trunk connection between the customer's IP-PBX and the service provider network, and solve interoperability issues to simplify deployments and support for remote diagnosis of reported issues.