Organizations/Events - Page 22.25

Discover Organizations/Events News

CodeCon: Call For Papers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

CodeCon is the premier showcase of active hacker projects. It is an excellent opportunity for developers to demonstrate their work, and for coding hackers to find out about what's going on in their community. All presentations must be accompanied by . . .

Vegas Braces for DefCon

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Sin City is about to be packed with thousands of hackers, wannabe geeks and phreaks who envision the perfect world as the following: Computer networks would welcome curious exploration, all information would be openly shared, a lot of public toilets would . . .

Cyberterrorism Conference Coming Up

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A global summit focusing on cyberterrorism and the targets of critical infrastructures has been announced for next month. The event, Sector 5, will be co-produced by Gardner and Flight Event Work, and held in Washington, D.C., between August 21 and 23. . .

Security Industry's Hacker-pipming Slammed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I spent three days at H2K2 hoping someone would say something worth mentioning in The Register. Finally, on Sunday, a couple of speakers did just that (on which more tomorrow). Best of all was Gweeds' savage synopsis of a thing which. . .

Whole Lot of Happy Hacker Campers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Just eight hours after the East Coast's largest hacking conference opened its doors Friday, H2K2 had already taken on the feel of summer camp for enthusiastic engineers. While most are here to hack around the clock for a few days and. . .

Hacker group targets Net censorship

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Some of the world's best-known hackers unveiled a plan this weekend to offer free software to promote anonymous Web surfing in countries where the Internet is censored, especially China and Middle Eastern nations. An international hacker group calling itself Hactivismo released a program on Saturday called Camera/Shy that allows Internet users to conceal messages inside photos posted on the Web, bypassing most known police monitoring methods.. . .

Who To Call About Computer Crime

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

How businesses should deal with law enforcement was a topic of discussion at INT Media Group's recent E-Security Conference and Expo in Vienna, Va. In separate sessions, attendees heard from David Green, principal deputy chief of the Department of Justice Computer . . .

Chief (in)security officer

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The departure of these and other information security veterans from Fortune 500 companies reflects the beginning of turbulent times for chief security officers (CSO). Since Sept. 11, CSOs have faced new pressures to prove the value and effectiveness of their security measures, even as they struggle politically for legitimacy within their corporations and for support from the technology and business units they're trying to protect, say analysts.. . .

Security firms tout savings, not safety

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

At a recent publicity event here, two security companies and accounting giant PricewaterhouseCoopers showed off their latest tool for selling software: a calculator that lets clients estimate how much money they can save by using the companies' offerings.. . .

Desperately Seeking the Security ROI

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Talk may be cheap, but the infosec price tag is not. It shouldn't come as a surprise that the infamous TCO (total cost of ownership) and ROI (return on investment) justifications have descended upon the unsuspecting troopers in the infosec trenches. Apparently, it's time for us security geeks to learn some new tricks.. . .

Anti-Spammers at Odds Over MAPS Legal Issues

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Anti-spammers are in disarray as a former employee is accusing Mail Abuse Prevention System LLC of "slimy" legal tactics. Nick Nicholas, former executive director at MAPS, posted comments online last week contending that MAPS executives had filed lawsuit affidavits that "are full of factual errors and material misrepresentations.". . .

Security Still an 'Afterthought'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Despite the current emphasis on security in the IT industry, CIOs and IT managers are still not paying enough attention to the problems facing their organizations, a panel of security experts said Wednesday. "Security is still very much an afterthought," said . . .

A New Degree Of Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The University of Texas at Dallas has joined forces with businesses and law-enforcement officials to create a center for cybercrime education and research. The Digital Forensics and Security Institute includes the collaborative efforts of the Greater Dallas Crime Commission, the . . .

Def Con 10 Convention

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The 10th anniversary of what has become the largest hacker convention on the planet! DEF CON 10 will be August 2nd to the 4th at the Alexis Park Hotel and Resort in Las Vegas, Nevada, USA.. . .

Korean firm offers $100,000 in hacking competition

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The first hacker to gain access to a server run by Korea Digital Works and leave their name on the site's front page this week will find it an enriching experience A Korean company is offering $100,000 (£70,000) in a 48-hour hacking competition, to be run this week. . . .

Seeing to the Health of the Body Corporate

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Most security strategies are primarily defensive. The plan is to stop attacks at the front (firewall), back (server) and/or bedroom (desktop) doors. This plan has zero tolerance for failure because it has no component for dealing with and diagnosing successful attacks. So when the inevitable breach occurs, so do the 2 a.m. phone calls, 24-hour work details and extensive system scrubbing and reconstruction.. . .

Web security guidelines say technology is not enough

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Alliance for Electronic Business (AEB) is hoping to overcome distrust of e-business with a new set of web security guidelines. The move follows evidence that trust and confidence are still a major barriers to adoption of Internet trading by UK businesses.. . .

Hacker speaks out on security basics

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security holes exist in just about every application, but preventing an attack can be remarkably simple, says an expert hacker "It's simple," says Rain Forest Puppy. "Don't feel you have to...take it from Microsoft, just figure out what services lead to security risks and turn them off.". . .

Warriors to demo DDoS defence

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The New Zealand Defence Force is to use an international conference to put a product created by Auckland company Esphion against distributed denial of service attacks through its paces. The event, known as the Joint Warrior Interoperability Demonstration (Jwid), will involve . . .