Tweet your way to a VIP ticket to HITBSecConf2013 in Amsterdam
Posted on 11 February 2013.
Bookmark and Share
Hack In The Box launched the #HITB1337Giveaway - A Twitter based competition that will see one lucky winner not only walk away with a VIP ticket to the triple track hacker conference in April but also $1337 to help with travel expenses.

To enter the giveaway follow HITBSecConf and tweet
This is my entry to the #HITB1337Giveaway! Please help me RT and win a VIP ticket to #HITB2013AMS and USD1337 - http://conference.hitb.org/1337.html
Each tweet counts as an entry and re-tweets from your followers will also count towards your total. You can tweet as many times as you want between the 11th of February and the 8th of March. When the competition ends, all tweets will be placed into a database and the winner will be chosen at random.

HITB2013AMS is the 4th annual HITB Security Conference in The Netherlands and the event is expected to attract just over 500 international delegates to the Okura Hotel in Amsterdam.

The keynote presentations will be delivered by Edward Schwartz, Chief Information Security Officer at EMC / RSA and Bob Lord, Director of Information Security at Twitter. The Call for Papers for the event has just closed and confirmed speakers will be announced in the coming days and weeks.

Members of the Evad3rs, responsible for the recent iOS 6.1 untethered jailbreak which was downloaded just over 7 million times days after release, have also submitted a presentation and are expected to make an appearance in the final line up.

“Hack In The Box has always strived to ‘keep knowledge free’ to make our conferences as accessible and affordable as we possibly can. We’ve been offering student and community discounted tickets for over a decade, however this competition marks the first time that we’re not only giving away a VIP invite but also helping with the winners travel costs”, said Dhillon Andrew Kannabhiran, Founder and Chief Executive Officer for Hack In The Box.

“We think the Twitter competition is an easy way for those who can’t afford to travel all the way over to The Netherlands to get a chance to attend and it’s also another way for us to ‘give back’ to the community and we like that”, he added.





Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //