

This presentation focuses on the various attack vectors and techniques used in mobile black and gray market activities, such as ad fraud and deepfakes. It will break down how these activities infiltrate and operate within mobile ecosystems. Additionally, the talk outlines a comprehensive defense strategy that encompasses threat intelligence, forensics, and detection tools. This strategy culminates in the development of a mobile security risk engine. This end-to-end framework is designed to proactively identify, block, and neutralize these types of attacks, with real-world case studies demonstrating its effectiveness in mitigating risks.
To
Game
Changers
What
You Will Get
Code knows no borders, but innovation demands a unique stage.
Where the lights of Victoria Harbour meet cyberpunk reality, we issue an invitation to the world's most dedicated minds. Hong Kong Hack is more than a tech summit—it is the vital nexus where Eastern and Western technical currents collide, and the proving ground for frontier thought.
We are seeking voices that refuse the status quo and are determined to pierce the future with disruptive technology, contributing to this non-profit technical exchange.

-
The Global Stage: Broadcast your vision from Hong Kong to the world. Your insights will gain curated access to the core technical circles of both the East and the West.
-
Elite Network: Engage and exchange with an unparalleled network of the world’s top cybersecurity experts, ethical hackers, and technology unicorn founders.
-
Collision of Minds: Whether you are a global pioneer or a local innovator, this is the singular venue for a catalytic fusion between two distinct, powerful innovation ecosystems.
This is an unparalleled opportunity to engage and exchange with global top-tier security experts, igniting a powerful collision of ideas.
If you possess technical insights that will disrupt existing paradigms, they must not remain dormant.
Join us in Hong Kong
Let's Code the Possible

Topics We Crave
#SmartDevice Security (IoT, smart vehicles, smart phones, UAV, etc)
#CIP Security
#AI Security
#OffensiveSECURITY
#DefensiveSECURITY
#Crypto/Web3

CFP Submission Rule
CFP Timeline
Submission Deadline: February 10, 2026
Speaker Acceptance Notification: March 10, 2026
All submissions must be in English and in PDF Format only via xxxx@xxx.xx
The following information must be included
Section A
Personal Data:
1. Name
2. Handler/Alias
3. Email Address
4. Company
5. Brief biography
6. Photo
Section B
Presentation Data:
1. Title of presentation
2. Category of Presentation
3. Newness of Material
4. Availability of Demo
5. Summary of Presentation
SPEAKERS' PRIVILEDGES
Speakers will be entitled to the following privileges:
* Up to USD 1000 of air-ticket reimbursement for global speakers
* Up to USD 300 of air-ticket reimbursement for Chinese Mainland speakers
* 2 nights' hotel accommodation included for all non-HK local speakers
* Pre-event welcome reception and Event Dinner for all speakers
By agreeing to speak at HKHACK, you are granting the Organiser of HKHACK the rights to reproduce, distribute, advertise and show your presentation including but not limited to HKHACK printed and/or electronic advertisements, and all other mediums.

Supporting Organizations








