WOOT '10 Call for Papers Now Available

WOOT '10 Call for Papers Now Available


WOOT '10 Call for Papers Now Available

Posted:

InfoSec News: WOOT '10 Call for Papers Now Available: Fowarded from: Lionel Garth Jones <lgj (at) usenix.org>
On behalf of the 4th USENIX Workshop on Offensive Technologies (WOOT '10) program committee, we are inviting you to submit papers that present research advancing the understanding of attacks on operating systems, networks, and applications. [...]

OV-site leaks personal data 168,000 passengers

Posted:

InfoSec News: OV-site leaks personal data 168,000 passengers: http://webwereld.nl/nieuws/66012/ov-site-lekt-persoonlijke-data-168-000-reizigers.html
By Brenno de Winter WebWereld May 18, 2010 (Google Translation from Dutch)
An ordering site for personal OV-chip cards show leak. Hackers have long-term access to information of 168,000 passengers. [...]

US hypocrisy in China cyberwar says expert

Posted:

InfoSec News: US hypocrisy in China cyberwar says expert: http://www.theaustralian.com.au/australian-it/us-hypocrisy-in-china-cyberwar-says-expert/story-e6frgakx-1225868338373
By Karen Dearne Australian IT May 18, 2010
THE recent China-US "cyberwar" exposed American hypocrisy on the issues of government surveillance and censorship, according to a US-based expert on security system design.
"Why is the country with the best technology for online surveillance of its citizens' communications taking other nations to task over censorship and free speech?" Mr Ranum, chief security officer of Tenable Network Security, challenged a packed forum at AusCERT 2010.
"For years, the US has embraced portions of the hacker community into our labs to build cyber-weapons, and there's government funding connections between our offensive weapons writers and our defensive weapons writers.
"We own the search engines everybody uses, and the incredibly valuable data they produce.
"So it's bizarre that in the recent exchange of accusations over China targeting dissident supporters of the Dalai Lama, no country asked the US to rein in its own cyber-hackers."
[...]

LifeLock CEO's Identity Stolen 13 Times

Posted:

InfoSec News: LifeLock CEO's Identity Stolen 13 Times: http://www.wired.com/threatlevel/2010/05/lifelock-identity-theft/
By Kim Zetter Threat Level Wired.com May 18, 2010
Apparently, when you publish your Social Security number prominently on your website and billboards, people take it as an invitation to steal your identity. [...]

Man accused of DDoSing conservative talking heads

Posted:

InfoSec News: Man accused of DDoSing conservative talking heads: http://www.theregister.co.uk/2010/05/19/bill_oreilly_ddos_attacks/
By Dan Goodin in San Francisco The Register 19th May 2010
Federal prosecutors have accused a man of carrying out a series of botnet offenses including attacks that brought down the websites of [...]

Symantec to buy VeriSign's security unit for $1.3B, reports say

Posted:

InfoSec News: Symantec to buy VeriSign's security unit for $1.3B, reports say: http://www.computerworld.com/s/article/9176949/Symantec_to_buy_VeriSign_s_security_unit_for_1.3B_reports_say
By Jaikumar Vijayan Computerworld May 18, 2010
Security vendor Symantec Corp. is reported to be close to buying Internet infrastructure services vendor VeriSign Inc. [...]

Liberia: New Democrat's Website Hacked

Posted:

InfoSec News: Liberia: New Democrat's Website Hacked: http://allafrica.com/stories/201005180373.html
New Democrat (Monrovia) 18 May 2010
Cowardly mischief makers, possibly with the backing of some higher-ups over the weekend hacked into the web-site of the New Democrat disfiguring it with a photograph and a message scrawled on it which [...]

Five Ways To (Physically) Hack A Data Center

Posted:

InfoSec News: Five Ways To (Physically) Hack A Data Center: http://www.darkreading.com/database_security/security/management/showArticle.jhtml?articleID=224900081
By Kelly Jackson Higgins DarkReading May 17, 2010
You can spend millions of dollars on network security, but it's all for naught if the data center has physical weaknesses that leave it open to [...]

Commercial Quantum Cryptography System Hacked

Posted:

InfoSec News: Commercial Quantum Cryptography System Hacked: http://www.technologyreview.com/blog/arxiv/25189/
Technology Review May 17, 2010
Physicists have mounted the first successful attack of its kind on a commercial quantum cryptography system.
When it comes to secure messaging, nothing beats quantum cryptography, a [...]

Cyberwar Cassandras Get $400 Million in Conflict Cash

Posted:

InfoSec News: Cyberwar Cassandras Get $400 Million in Conflict Cash: http://www.wired.com/dangerroom/2010/05/cyberwar-cassandras-get-400-million-in-conflict-cash/
By Noah Shachtman Danger Room Wired.com May 17, 2010
Coincidences sure are funny things. Booz Allen Hamilton -- the defense contractor that's become synonymous with the idea that the U.S. [...]

[Dataloss Weekly Summary] Week of Sunday, May 9, 2010

Posted:

InfoSec News: [Dataloss Weekly Summary] Week of Sunday, May 9, 2010: ========================================================================
Open Security Foundation - DataLossDB Weekly Summary Week of Sunday, May 9, 2010
11 Incidents Added.
======================================================================== [...]

P2P networks a treasure trove of leaked health care data, study finds

Posted:

InfoSec News: P2P networks a treasure trove of leaked health care data, study finds: http://www.computerworld.com/s/article/9176883/P2P_networks_a_treasure_trove_of_leaked_health_care_data_study_finds
By Jaikumar Vijayan Computerworld May 17, 2010
Nearly eight months after new rules were enacted requiring stronger protection of health care information, organizations are still leaking such data on file-sharing networks, a study by Dartmouth College's Tuck School of Business has found.
In a research paper to be presented at an IEEE security symposium Tuesday, a Dartmouth College professor Eric Johnson will describe how university researchers discovered thousands of documents containing sensitive patient information on popular peer-to-peer (P2P) networks.
One of the more than 3,000 files discovered by the researchers was a spreadsheet containing insurance details, personally identifying information, physician names and diagnosis codes on more than 28,000 individuals. Another document contained similar data on more than 7,000 individuals. Many of the documents contained sensitive patient communications, treatment data, medical diagnoses and psychiatric evaluations. At least five files contained enough information to be classified as a major breach under current health-care breach notification rules.
While some of the documents appear to have been leaked before the Obama administration's Health Information Technology for Economic and Clinical Health (HITECH) Act was enacted, many appear to be fairly recent. A previous study by Dartmouth in 2008 also unearthed files containing health-care data floating on P2P networks, such as Limewire, eDonkey and BearShare. Among the documents found in that study was one containing 350MB of patient data for a group of anesthesiologists and another on patients at an AIDS clinic in Chicago.
[...]

0 comments:

Post a Comment