BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:Europe/Prague
BEGIN:DAYLIGHT
DTSTART:20250330T030000
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20251026T020000
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20251025T161449Z
UID:324015B1-E364-408B-B3DB-DACCE572F7F5
DTSTART;TZID=Europe/Prague:20251020T180000
DTEND;TZID=Europe/Prague:20251020T200000
DESCRIPTION:The lecture will present new security research and the &quot;DOM-bas
 ed extension clickjacking&quot; technique\, which targets browser extensions. T
 he technique described is general and can be used on various types of web 
 browser extensions. The research itself focused on the 11 most widely used
  password managers. The result was the discovery of several serious zero-d
 ay vulnerabilities that affected millions of users.\n\nWas your password m
 anager vulnerable too? How did password manager developers respond to the 
 vulnerability? What could an attacker have gained? You will learn all this
  and much more in this lecture!\n\nThe event is part of the [Informatics E
 venings at FIT CTU](https://fit.cvut.cz/en/life-at-fit/fit-live/regular-ev
 ents/4917-informatics-evenings) series in cooperation with [IEEE Young Pro
 fessionals](https://www.ieee.cz/main/section/young-professionals/).\n\nMar
 ek Tóth\n\n[Marek Tóth](https://marektoth.com/) is an Ethical Hacker (Pe
 netration Tester). He deals with IT security\, focusing primarily on findi
 ng security vulnerabilities in web applications. He has been actively inte
 rested in this area since 2018\, searching for web vulnerabilities that co
 uld be exploited.\n\nMarek Tóth has discovered a number of significant an
 d widely publicized vulnerabilities\, including on Seznam ([article](https
 ://marektoth.cz/blog/kradez-cookies-na-seznamu)) and HeroHero ([article](h
 ttps://marektoth.cz/blog/herohero-kriticka-bezpecnostni-chyba/)). One of h
 is latest achievements was the discovery of vulnerabilities in widely used
  password managers with a potential impact on tens of millions of users wo
 rldwide ([article](https://marektoth.cz/blog/dom-based-extension-clickjack
 ing/)).\n\nRoom: T9:107\, Thákurova 9\, Czech Technical University in Pra
 gue\, Prague\, Czech Republic\, Czech Republic\, 160 00
LOCATION:Room: T9:107\, Thákurova 9\, Czech Technical University in Prague
 \, Prague\, Czech Republic\, Czech Republic\, 160 00
ORGANIZER:fiserp@fit.cvut.cz
SEQUENCE:1
SUMMARY:Informatics evenings: Data in password managers at risk – Clickja
 cking is still alive and well
URL;VALUE=URI:https://events.vtools.ieee.org/m/507867
X-ALT-DESC:Description: &lt;br /&gt;&lt;div class=&quot;row&quot;&gt;\n&lt;div class=&quot;col-lg-8 offse
 t-lg-2&quot;&gt;\n&lt;div class=&quot;perex entry&quot;&gt;\n&lt;p&gt;The lecture will present new secur
 ity research and the &quot;DOM-based extension clickjacking&quot; technique\, which 
 targets browser extensions. The technique described is general and can be 
 used on various types of web browser extensions. The research itself focus
 ed on the 11 most widely used password managers. The result was the discov
 ery of several serious zero-day vulnerabilities that affected millions of 
 users.&lt;/p&gt;\n&lt;/div&gt;\n&lt;/div&gt;\n&lt;/div&gt;\n&lt;div class=&quot;row&quot;&gt;\n&lt;div class=&quot;col-lg-
 8 offset-lg-2&quot;&gt;\n&lt;div class=&quot;entry&quot;&gt;\n&lt;p&gt;Was your password manager vulnera
 ble too? How did password manager developers respond to the vulnerability?
  What could an attacker have gained? You will learn all this and much more
  in this lecture!&lt;/p&gt;\n&lt;p&gt;The event is part of the&amp;nbsp\;&lt;a href=&quot;https://
 fit.cvut.cz/en/life-at-fit/fit-live/regular-events/4917-informatics-evenin
 gs&quot;&gt;Informatics Evenings at FIT CTU&lt;/a&gt;&amp;nbsp\;series in cooperation with&amp;n
 bsp\;&lt;a href=&quot;https://www.ieee.cz/main/section/young-professionals/&quot;&gt;IEEE 
 Young Professionals&lt;/a&gt;.&lt;/p&gt;\n&lt;/div&gt;\n&lt;/div&gt;\n&lt;/div&gt;\n&lt;div class=&quot;row&quot;&gt;\n&lt;
 div class=&quot;col-lg-8 offset-lg-2&quot;&gt;\n&lt;div class=&quot;entry&quot;&gt;\n&lt;p&gt;&lt;strong&gt;Marek T
 &amp;oacute\;th&lt;/strong&gt;&lt;/p&gt;\n&lt;p&gt;&lt;a href=&quot;https://marektoth.com/&quot;&gt;Marek T&amp;oacu
 te\;th&lt;/a&gt;&amp;nbsp\;is an Ethical Hacker (Penetration Tester). He deals with 
 IT security\, focusing primarily on finding security vulnerabilities in we
 b applications. He has been actively interested in this area since 2018\, 
 searching for web vulnerabilities that could be exploited.&lt;/p&gt;\n&lt;p&gt;Marek T
 &amp;oacute\;th has discovered a&amp;nbsp\;number of significant and widely public
 ized vulnerabilities\, including on Seznam (&lt;a href=&quot;https://marektoth.cz/
 blog/kradez-cookies-na-seznamu&quot;&gt;article&lt;/a&gt;) and HeroHero (&lt;a href=&quot;https:
 //marektoth.cz/blog/herohero-kriticka-bezpecnostni-chyba/&quot;&gt;article&lt;/a&gt;). O
 ne of his latest achievements was the discovery of vulnerabilities in wide
 ly used password managers with a&amp;nbsp\;potential impact on tens of million
 s of users worldwide (&lt;a href=&quot;https://marektoth.cz/blog/dom-based-extensi
 on-clickjacking/&quot;&gt;article&lt;/a&gt;).&lt;/p&gt;\n&lt;/div&gt;\n&lt;/div&gt;\n&lt;/div&gt;
END:VEVENT
END:VCALENDAR

