Organizations/Events - Page 23

Discover Organizations/Events News

Korean firm offers $100,000 in hacking competition

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The first hacker to gain access to a server run by Korea Digital Works and leave their name on the site's front page this week will find it an enriching experience A Korean company is offering $100,000 (£70,000) in a 48-hour hacking competition, to be run this week. . . .

Seeing to the Health of the Body Corporate

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Most security strategies are primarily defensive. The plan is to stop attacks at the front (firewall), back (server) and/or bedroom (desktop) doors. This plan has zero tolerance for failure because it has no component for dealing with and diagnosing successful attacks. So when the inevitable breach occurs, so do the 2 a.m. phone calls, 24-hour work details and extensive system scrubbing and reconstruction.. . .

Web security guidelines say technology is not enough

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Alliance for Electronic Business (AEB) is hoping to overcome distrust of e-business with a new set of web security guidelines. The move follows evidence that trust and confidence are still a major barriers to adoption of Internet trading by UK businesses.. . .

Hacker speaks out on security basics

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security holes exist in just about every application, but preventing an attack can be remarkably simple, says an expert hacker "It's simple," says Rain Forest Puppy. "Don't feel you have to...take it from Microsoft, just figure out what services lead to security risks and turn them off.". . .

Warriors to demo DDoS defence

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The New Zealand Defence Force is to use an international conference to put a product created by Auckland company Esphion against distributed denial of service attacks through its paces. The event, known as the Joint Warrior Interoperability Demonstration (Jwid), will involve . . .

Group to set bug-reporting standards

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Microsoft and other software makers met with several computer-security companies Thursday to hash out the last details of a group that will set guidelines for reporting software flaws that affect Internet security. Currently named the Organization for Internet Safety, the group . . .

Linux for the paranoid

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Last weekend's CodeCon conference in San Francisco saw the launch of Tinfoil Hat Linux, a self-proclaimed "exercise in over engineering" and security. What started out as a secure, single floppy, bootable Linux distribution for storing PGP keys, and encrypting, signing and . . .

RSA: Securing Web services

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Heavyweight security vendors and niche players alike are choosing the RSA Conference 2002 this week to present products designed to provide some of the missing pieces of real-world security environments for Web services.. . .

Dot-com dropouts share open-source love

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Open-source programmers gathered this past weekend to share ideas and dreams about new methods for distributing encrypted data across the Internet and plans for a peer-to-peer wireless backbone. Aside from a common love of computing, the crowd gathered in the dim confines of a nightclub at the edge of Multimedia Gulch here shared another trait: Most of them are unemployed.. . .

Protecting Critical Information Infrastructures Conference and Exhibition

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This email address is being protected from spambots. You need JavaScript enabled to view it. sent in a note about their upcoming conference. "For the FIRST time the Civil Contingencies Secretariat (CCS) will present their concept of the National Resilience Framework, developed as a basis for managing risk and resilience in key areas of the UK's infrastructure.". . .

BSIA and IAAC Form Strategic Partnership

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Neil Robinson submitted information on their recent partnership with the BSIA. "The Information Assurance Advisory Council and the British Security Industry Authority (BSIA) today announced a partnership to promote a greater understanding of the overarching issues concerning physical and information security. While physical security provisions are integrated into the operating procedures of most organisations, information security is often overlooked. . . .

Saint emerges as hacker tackler

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The IT industry has formed an alliance to tackle hackers, viruses and product vulnerabilities. The Security Alliance for Internet and New Technologies (Saint) is backed by the Department of Trade and Industry and supplier group the Computer Software and Services . . .

ICANN ponders DNS hack defence role

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the wake of the September 11 terrorist attacks the Internet Corporation for Assigned Names and Numbers (ICANN) swept aside most of its scheduled agenda to explore its options in shoring up the security of the Internet's domain name system (DNS), . . .

Rubi Con 2002

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This email address is being protected from spambots. You need JavaScript enabled to view it. writes, "With security being a really hot topic, next year's Rubi-con security and technology conference looks very promising. Featuring a keynote by Steve Wozniak and presentations from ISS and many of the other big players in security, the fourth annual Rubi-con should be a great show.. . .

ITxpo: Net devices worsen IT security problems

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

So-called "fixed devices," such as gaming consoles and digital satellites, have proven prone to hacking, which can lead to stolen services and intellectual property. Mobile devices are even more vulnerable because not only can they be physically lost or stolen but their transmissions can be easily intercepted, a breach that could enable data theft and virus infections.. . .

LWN Loses Tucows Support

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Linux Weekly News, founded four years ago and acquired by Tucows a year or so ago, is at risk of ceasing operations as Tucows cuts back on expenses. LWN is one of the original news magazines for the open source community, and they are seeking ideas to continue to operate during these financial straits.. . .

MAPS, Experian settle antispam lawsuit

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Mail Abuse Prevention System LLC (MAPS), a private, antispam group, and Experian eMarketing Inc. have settled a lawsuit over Experian's listing on the Realtime Blackhole List (RBL). Both sides announced the settlement late Wednesday.. . .

The Black Hat Briefings Amsterdam 2001

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Every year leaders in the security field are brought together to this conference to discuss the latest threats, trends, products, and influences in the Internet and security environment. Don't miss it. This year's topics include: Routing Protocol Attacks, Mobile Security: SMS . . .

W3C patent plan draws protests

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new and controversial proposal under consideration by the World Wide Web Consortium could open the way for companies to claim patent rights--and demand royalties--on standards authorized by that body. The W3C works with developers, software makers and others to come . . .