Diverse group of Chinese hackers wrote code in attacks on Google, U.S. companies

Diverse group of Chinese hackers wrote code in attacks on Google, U.S. companies


Diverse group of Chinese hackers wrote code in attacks on Google, U.S. companies

Posted:

InfoSec News: Diverse group of Chinese hackers wrote code in attacks on Google, U.S. companies: http://www.washingtonpost.com/wp-dyn/content/article/2010/02/19/AR2010021902643.html
By Ellen Nakashima Washington Post Staff Writer February 20, 2010
Some of the computer codes used in the recent attacks on the networks of Google and dozens of other major U.S. [...]

Chinese school linked to Google attacks also linked to '01 attacks on White House site

Posted:

InfoSec News: Chinese school linked to Google attacks also linked to '01 attacks on White House site: http://www.computerworld.com/s/article/9159258/Chinese_school_linked_to_Google_attacks_also_linked_to_01_attacks_on_White_House_site?taxonomyId=17
By Jaikumar Vijayan Computerworld February 19, 2010
One of two Chinese academic institutions identified in a New York Times [...]

Hacker Arrested in Billboard Porn Stunt

Posted:

InfoSec News: Hacker Arrested in Billboard Porn Stunt: http://www.themoscowtimes.com/news/article/hacker-arrested-in-billboard-porn-stunt/399895.html
By Alexandra Odynova The Moscow Times 17 February 2010
Police in the southern city of Novorossiisk have arrested a man accused of hacking into a video billboard in Moscow last month and showing a [...]

Stolen passports were issued before encryption safeguards

Posted:

InfoSec News: Stolen passports were issued before encryption safeguards: http://www.thepost.ie/news/ireland/stolen-passports-were-issued-before-encryption-safeguards-47544.html
By John Burke Public Affairs Correspondent The Sunday Business Post 21 February 2010
The five Irish passport numbers that were stolen by a team of hitmen who [...]

Spike In Power Grid Attacks Likely In Next 12 Months

Posted:

InfoSec News: Spike In Power Grid Attacks Likely In Next 12 Months: http://www.darkreading.com/security/vulnerabilities/showArticle.jhtml?articleID=223000369
By Kelly Jackson Higgins DarkReading Feb 19, 2010
Attacks against the power grid are likely to rise and intensify during the next 12 months as smart grid research and pilot projects advance, [...]

Argentinian hackers plaster their country's flag over Falklands newspaper website as new conflict begins

Posted:

InfoSec News: Argentinian hackers plaster their country's flag over Falklands newspaper website as new conflict begins: http://www.dailymail.co.uk/news/worldnews/article-1252738/Argentinian-hackers-plaster-countrys-flag-Falklands-newspaper-website-new-conflict-begins.html
By David Gardner The Daily Mail 21st February 2010
Argentinian hackers drew first blood in the latest Falklands stand-off [...]

SECART - Second International Workshop on Security and Artificial Intelligence - Atlanta, Georgia, USA, July 11, 2010

Posted:

InfoSec News: SECART - Second International Workshop on Security and Artificial Intelligence - Atlanta, Georgia, USA, July 11, 2010: SECART - Second International Workshop on Security and Artificial Intelligence Atlanta, Georgia, USA, July 11, 2010 http://www.tzi.de/~edelkamp/secart
INTRODUCTION:
Our increasingly networked world continues to provide new opportunities for security breaches that have severe consequences at the personal level (identity theft, and resulting financial losses), for businesses (theft of intellectual property, or business plans, or costly responses to the theft of customer data), and for governments. Computing and the internet have become crucial parts of the infrastructure of almost every significant commercial or governmental enterprise. Turning off the computers or disconnecting from the network has become tantamount to turning off the power. The use of techniques drawn from AI is increasingly relevant as the scale of the problem increases, in terms of the size and complexity of the networks being protected, the variety of applications and services provided using that infrastructure, and the sophistication of the attacks being made. With this workshop, we hope to encourage dialogue and collaboration between the AI and Security communities. Previous events in this area include the ICAPS-09 workshop on Intelligent Security, as well as ones held in conjunction with the ACM Conference on Computer and Communications Security, in 2008 and 2009.
Workshop themes include both applied and theoretical results regarding the application of AI techniques to security problems (or, alternatively, novel security issues caused by the use of AI techniques). Possible topics include but are not limited to the following:
* Knowledge Representation and Engineering for Cyber Security * Secure Web Services * Development of Trusted Software * Data Mining and Forensics * Automated Vulnerability Analysis * Automated Exploit and Attack Generation * Automated Alerting and Response * Diagnosis and Plan Recognition * Automating Security Analyses and Audits * Artificial Immune Systems * Privacy and Confidentiality * Intelligent User Interfaces for Security Applications * Security and Organizational Structure
WORKSHOP ORGANISERS
Chairs:
Mark Boddy Adventium Labs Minneapolis, USA mark.boddy at adventiumlabs.org
Stefan Edelkamp TZI University Bremen, Germany edelkamp at tzi.de
Robert P. Goldman SIFT, LLC Minneapolis, USA rpgoldman at sift.info
Program Committee: Lee Badger (NIST, US) Bob Balzer (Teknowledge, US) Mark Boddy (Adventium Labs, US) Cas Cremers (ETH, Switzerland) Stefan Edelkamp (U Bremen, G) Chris Geib (U Edinburgh, GB) Robert P. Goldman (SIFT, US) Rachel Greenstadt (Drexel U, US) Henry Kautz (U of Rochester, US) Alessio Lomuscio (IC London, GB) Norbert Pohlmann (IF(IS), G) Anil Somayaji (Carleton U, CA) Shannon Spires (Sandia Labs, US) Tim Strayer (BBN Technologies, US) Karsten Sohr (TZI Bremen, G) Dan Thomsen (SIFT and CDA, US) Luca Vigano (U Verona, I) Yacine Zemali (LIFO, FR)
Deadline for submissions: March 29, 2010 Notification of acceptance: April 15, 2010 Final versions due: May 4, 2010
Submission instructions: Articles in pdf format of up to 8 pages in AAAI plain article style are to be submitted to the Easy Chair (https://www.easychair.org/login.cgi?conf=secart10) system by the deadline above.
Publication details: Informal proceedings of the workshop will be published by and made available to all workshop participants on the day. Depending on the nature of the submissions received, we may consider a more formal post-workshop publication.
Format/Fees: The workshop will be held in Atlanta, Georgia, USA, on July 11 or 12th 2010, as a one-day workshop associated with AAAI-10. Details of attendance fees will be posted as they become available from AAAI. In the past, AAAI has permitted workshop-only registrations.
SECART is affilliated with AAAI-10

NIST laying the groundwork for more advanced cryptography

Posted:

InfoSec News: NIST laying the groundwork for more advanced cryptography: http://gcn.com/articles/2010/02/19/nist-crypto-docs-021910.aspx
By William Jackson GCN.com Feb 19, 2010
The National Institute of Standards and Technology has released two documents as part of its Cryptographic Key Management Project -- a summary of a key management workshop held in June that explored the risks and challenges of handling cryptographic keys in new technological environments, and a draft of recommendations for agencies on transitioning to new algorithms and keys.
Key management is one of the most difficult tasks in cryptography, because a cryptographic algorithm or scheme is only as secure as the keys used to encrypt and decrypt data. The scalability and usability of the methods used to distribute keys are of particular concern. NIST's key management project is an effort to improve the overall key management strategies to enhance the usability of cryptographic technology, provide scalability and support a global cryptographic key management infrastructure.
The first step in achieving those goals was a workshop NIST hosted in June that examined the obstacles in using the key management methodologies currently in use. It also covered alternative technologies that key management needs to accommodate and approaches for moving from current methodologies to more desireable methods.
The results of the workshop are summarized in NIST Interagency Report 7609. An approach to transitioning to new generations of keys and algorithms is provided in a draft of Special Publication 800-131, "Recommendation for the Transitioning of Cryptographic Algorithms and Key Sizes."
[...]

0 comments:

Post a Comment