Organizations/Events

Discover Organizations/Events News

'Hacktivity 2010' tackles computer security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Caterpillars, roaches and worms crawl on a computer, which represents an infected computer, next to a clean one, in a display that illustrates computer safety at Hacktivity, in Budapest. The major hackers' conference wrapped up in Hungary Sunday after higlighting protection against increasingly sophisticated computer piracy as the Internet becomes ever more present in daily life.

Scaling the Security Chasm

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Many people wear seatbelts because they could get fined if they don't, rather than because wearing them might save their life, security consultant Dr. Anton Chuvakin observed during his keynote speech at the Hack In The Box security convention in Amsterdam in early July. It's an interesting observation, and one that has interesting implications for server security.

Browsers' private modes leak info, say researchers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Browsing in "private mode" isn't as private as users think, a researcher said today. "There are some traces left behind [by all browsers] that could reveal some of the sites that you've been to," said Collin Jackson, an assistant research professor at the Silicon Valley campus of Carnegie Mellon University. Jackson, along with three colleagues from Stanford University, will present their findings later today at the Usenix Security Symposium in Washington, D.C.

Lolpolicy for defining Linux security #LinuxCon

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Ever wonder how lolspeak, the language of lolcats could be used to secure Linux? At LinuxCon, Joshua Brindle from Linux security vendor Tresys detailed something he called lolpolicy for making SELinux security policies easier to manage.

Black Hat convention hype hurts the enterprise risk management process

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For a few weeks in 1982, I was convinced that space aliens were outside my house. I had irrefutable evidence: strange lights, odd noises, and the like. Of course, the lights were the neighbor's pool, and the noises were the wind. I was just a child, caught up in the hysteria of having just watched the movie Alien on cable a few nights before. I eventually grew up and accepted the reality that aliens were not going to eat me.

Important Lessons to Learn from the Black Hat ATM Hack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A security researcher named Barnaby Jack amazed attendees at the Black Hat security conference by hacking ATM machines in a session titled "Jackpotting Automated Teller Machines Redux". There are some important lessons to be learned from the hacks Jack demonstrated, and they apply to more than just ATM machines.

Black Hat too commercial for you?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Two premiere security conferences -- Black Hat and DefCon -- run back-to-back in Las Vegas this week, each with their own distinct flavor. But even these events don't meet the needs of all computer security pros, setting the stage for a widening set of satellite events.

Defcon social engineering contest stirs concerns

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A capture-the-flag-style competition slated to take place at Defcon later this month has raised eyebrows at a number of companies who are concerned they will be embarrassed or negatively impacted in some way. CSO first reported the CTF challenge earlier this month in Defcon contest to spotlight social engineering. The challenge asks contestants to collect information about a "target" company, which they are assigned to by contest coordinators at the web site social-engineer.org.

IE and Safari lets attackers steal user names and addresses

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Internet Explorer, Firefox, Chrome, and Safari browsers are susceptible to attacks that allow webmasters to glean highly sensitive information about the people visiting their sites, including their full names, email addresses, location, and even stored passwords, a security researcher says.

Maiffret returns to eEye Digital Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Three years ago, Marc Maiffret was tired. He had been running hard as CTO of eEye Digital Security since co-founding the company at age 17. So after a decade, he walked away. He recently resurfaced as chief security architect at FireEye, and did an extensive interview with CSO about how security threats have changed since his eEye days.

Pirate Bay founding group disbands

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Swedish anti-copyright group Piratbyran, which gave rise to the popular file-sharing website The Pirate Bay has disbanded. Marcin de Kaminski, a founder of Piratbyran, which means "piracy bureau" in English, told BBC News "we don't feel we are needed" any more.

$11.7m judgment against Spamhaus slashed to $27,000

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A federal judge has handed a major victory to anti-spam crusaders Spamhaus, slashing an $11.7m verdict to just $27,002. US Judge Charles P. Kocoras of the Eastern District of Illinois said the plaintiffs, e360 Insight and its founder David Linhardt, failed to credibly calculate the damage that resulted when its promotional emails were targeted by Spamhaus.

The HacKid Conference: An idea whose time has come

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I go to a lot of security conferences, almost always without my family in tow. The logistics and money involved with trekking them from one part of the country to the next is usually beyond my resources. But when a conference is local and there's something in it for the kids, I'm in 100 percent.