Organizations/Events - Page 24.25

Discover Organizations/Events News

Hackers ready for a HAL of a party

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Hackers are back. The brief lull in the otherwise noisy thrashing about of the hacker community is over. With the FBI arrest last month of Russian programmer Dmitry Sklyarov at the DEFCON hacker convention, hackers have a new poster boy for . . .

Security Outsourcing: Exposed!

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

On April 25, Pilot Network Services went out of business, abandoning 200 customers that relied on them for something rather important: security. ... the end came quickly. Pilot employees received four e-mails in rapid succession. The first said the phones would be disconnected. The second added that pagers and mobiles would be taken away. The third said the CFO had resigned. And for anyone who couldn't see the elephant-not just in the room but squirting river water in their faces-the last e-mail said, "At 4:30 p.m., you're fired." . . .

Report: Companies Hacked on Average Six or More Times Per Year

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A survey of American companies reveals that not only are companies' networks being attacked six or more times per year, but these attacks are becoming increasingly criminal in nature, compromising private information, destroying valuable data and exposing businesses to significant liability. . . .

Net activists launch campaign to jam 'Echelon'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Internet privacy activists and "hacktivists" have announced a day-long cyber-protest intended to jam a computer surveillance network whose existence isn't acknowledged by the governments said to run it. The activists set October 21 as "Jam Echelon Day," calling on individuals to . . .

Activists target U.S. surveillance system

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A group of Internet activists hopes to bring attention to the controversial U.S.-led communications spy network Echelon with a "Jam Echelon Day." But privacy experts say the protest as planned will have a minimal effect on the sophisticated surveillance system. Organizers . . .

DEF CON 9 - Open Letter to the community

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Having just finished my 9th DEF CON, I have a few thoughts - I am looking for feedback from the community to help decide the next steps for the future of DEF CON. First, let me give you a brief history so you can see where I am coming from and to allow you to decide where you think we should go in future shows.. . .

Sklyarov arrest roundup: EFF to meet with Adobe, but protests still on

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A top Linux kernel hacker is calling for a boycott of technology conferences in the United States, but the Electronic Frontier Foundation is asking organizers of planned protests to put them on hold while it negotiates with Adobe for the release of Russian programmer Dmitry Sklyarov, who was arrested after speaking at Def Con in Las Vegas earlier this week.. . .

Controversial research to be presented at USENIX

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

NewsForge writes, "The USENIX Association today confirmed the inclusion of a controversial research paper to its Security Symposium to be held in Washington, DC next month. The paper reveals inherent security risks with the recording industry's digital music access-control technologies. Dr. . . .

Def Con wears a white hat now

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Is hacking starting to lose its culture? Though black clothing still dominated and clusters of hackers exchanging information was still the norm, the crowd at this year's Def Con was older and appeared to be far more professional. "It is more laid back this year," acknowledged Jeff Moss, the founder of the conference, now in its ninth year.. . .

Hackers in Suits? Gadzooks!

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For nine years, Defcon has been known as the world's most exuberant party for hackers and hacker hopefuls who gather in sin city for a rollicking good time. Conference organizers call it the "annual computer underground party for hackers," and Defcon . . .

Security showdown: Black Hat vs. Def Con

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Las Vegas plays host to two separate security conferences this week--one for people who guard computer systems, another for those who break into them. System administrators and hackers, CIOs and script kiddies will all gather in the desert to trade information, . . .

Hackers Convene Amid Signs Computer Security Is Eroding

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Hacker conventions, such as those being held in Las Vegas this week, are no longer considered the sinister gatherings they once were. If the slot machines get a little screwy this week, casino detectives will have plenty of suspects. Thousands of computer hackers and security experts begin converging in Las Vegas Tuesday for the annual Black Hat Briefings and Def Con convention on computer security.. . .

IT directors not gambling on security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Despite high profile security breaches the issue is still not a priority for many, a survey finds Half of IT directors are willing to bet less than £1 that their IT systems are safe from hacker attack, according to a . . .

User group proposes OS security standards

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Center for Internet Security (CIS), a coalition of internet user groups, yesterday released the first set of minimum security standards for operating systems. Starting off with specs for Solaris, the user group plans to introduce similar standards for Windows, as . . .

The Black Hat Briefings 2001 USA

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Black Hat Briefings is a conference for researchers, IT professionals and experienced security administrators. Every year, leaders in the security field are brought together to Black Hat to discuss the latest threats, trends, products, and influences in the Internet and . . .

ICANN To Gauge Privacy Concerns Over 'Whois' Database

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The organization charged with managing the worldwide Domain Name System (DNS) has launched a study to gauge privacy concerns raised by the plethora of personal information contained in the "Whois" database, a publicly searchable resource used to determine the identity of . . .