Reboot and a Summary of ROOTCON 6

What would happen to civilization if one uneventful day, someone hacked and shutdown the power supply all over the world? It’s a total reboot. It’s something that might not happen but posed as a philosophical question on the movie we watched at a conference.

You see last, September 7-8, I joined ROOTCON 6 at Parklane. Dubbed as the a premier information security conference in the Philippines, it was well attended by around 100+ participants who gathered for 2-days to discuss topics such as cyber espionage, advergaming, malwares, and virtualization among others.

Among the things that were done in the conference, the movie showing was most memorable for me. Probably because it’s more enticing when you see something on screen or maybe just because I’m a visual learner.

The Reboot Movie


Although it had less than awesome reviews, the movie’s ending posed a philosophical question: What would happen if you do a reboot on civilization starting with stopping power sources? Lots of bad things maybe.

But aside from that, it shows the underlying battle between whitehat and blackhat hackers. The story starts with the heroine’s home trashed. She can’t remember who she is. Worst part is that there’s a smartphone glued to her hand. It starts like that. And the movie was funded through Kickstarter. Here’s a trailer if you’re interested:

The Keynote: Cyber Espionage

I chatted a bit with the ROOTCON Founder Mr. Dax Labrador and learned some notes on the status of cybersecurity here in the PH.

The topic for this year’s CON – Cyber Espionage – was picked because of the recent and relevant issue between Philippines and China over territories. It would be noted that on the last article I contributed for GMA, the Pinoy hackers made their move against China by defacing websites. Read more here.

Much like ecommerce, information security is still at an infancy stage here in the Philippines. “The goal of the conference is to let people know that cyber espionage really exists. Even at the corporate level, we can see this.”, Labrador said.

He explained that cyber espionage is using weaknesses of systems to gain information on the strength of a country for example. “Before you make your move, you want to know its strengths and weaknesses.”, he added.

The good news though is that even if the country is still in its infancy stage, our government is well on its way to understanding the workings of the community and realizing that not all hackers are bad guys.

“Through gatherings like ROOTCON, we bridge enterprise, government and underground hacker community to truly understand information security.”, Labrador concludes.


Storified by Fleire Castro · Sun, Sep 16 2012 00:48:09

Bye #rootcon! You’ve been awesome.Chris Boyd
#rootcon 6 ended with an exciting game of Hacker’s Jeopardy.Carl Saturnino
Jolly Mongrel for #rootcon 6 on evaluating weakness of safety boxes (my fave speaker since con 5!) Castro
#rootcon 6 JollyMongrel: Security vulnerability of Personal Safety Boxes in the PHwilson chua
Kaspersky contest winner on stage for #rootcon Castro
#rootcon 6 SoulSystem: Secure Online USB Login system (SOUL)wilson chua
#rootcon 6 SoulSystem: They converted USB flash into a hardware tokenwilson chua
"Social Engineering is one of the methods used to gain information…" #rootcon #cyberespionage by @z_edian. | via @zveloLabsCarl Saturnino
#rootcon 6 Sven Herpig(zedian): Social Engineering: Because there is no patch for human stupiditywilson chua
"Espionage in Cybertopia – A Government’s Tale" by Sven Herpig" #rootconzveloLabs
"More than 90% of threats come from the web" – @gfilabsph #rootcon | via @zveloLabsCarl Saturnino
Former leader of a PH-based hacker’s group was asked re their mission and vision: "As the leader of the group, I don’t know." LOL #rootconCarl Saturnino
Demo on the different web attack vectors such XSS, RFI and SQLi by @loophaze #rootcon | via @zveloLabsCarl Saturnino
#rootcon 6 Havj a new tool used by Noobs to analyze website’s vulnerabilitywilson chua
Nitrob for his #rootcon 6 talk. (Met him online last year 2011 – year of the hacker) Castro
Great insight from lawrence hughes on the REAL threat of malwares using #IPv6 #rootconCarl Saturnino
LegitApp vs. Malware #rootcon | via @zveloLabs Saturnino
Paulo’s conf featured on Bandila #ROOTCON via @ABSCBNNewsKatrina Cunanan
#rootcon 6 Berman Enconado: Im not discussing any groundbreaking malware topics.wilson chua
@updiliman has the largest IPv6 deployment in the Philippines with 15k active nodes #rootcon #trivia #IPv6Carl Saturnino
#rootcon 6 TikbalangPH: To prevent jailbreak, install IPS in the hardware host.wilson chua
#rootcon 6 TikbalangPH: Malware are now virtual-aware.wilson chua
First talk of the day "Risks of Virtualization" by @tikbalangph #rootconzveloLabs
Day 2 #rootcon 6. Interesting talks from Day 1 esp the disc n demo of a Mac backdoor malware that enables an attacker to control a MacCarl Saturnino
RT @likke: Gamers are tweaking settings to remove ads from xbox. @paperghost #rootcon chua
RT @likke: @Paperghost on the stage for #rootcon for advergaming systems Boyd
Cyber Espionage (How to sell a country in 17 days) #rootcon Saturnino
#rootcon 6 Paul Sabanal: Was able to exploit a vulnerability in PDF by running a calculator app when the PDF was run (twice).wilson chua
RT @semprix: #rootcon Andro Rivera
#rootcon just kicked-off! First speaker is up, let’s hear more about #IPv6z
All set for #rootcon. LoL Fork Meister
Going to #rootcon ? You need a bag tag.

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text. captcha txt

Start typing and press Enter to search