NASA sells PC with restricted Space Shuttle data

NASA sells PC with restricted Space Shuttle data


NASA sells PC with restricted Space Shuttle data

Posted:

InfoSec News: NASA sells PC with restricted Space Shuttle data: http://www.theregister.co.uk/2010/12/08/nasa_disk_wiping_failure/
By Dan Goodin in San Francisco The Register 8th December 2010
NASA officials failed to wipe sensitive agency data from computers before releasing them to the public, a violation of procedures that are [...]

U.S. Bank allegedly concealed data breach

Posted:

InfoSec News: U.S. Bank allegedly concealed data breach: http://www.startribune.com/business/111499139.html
By DAN BROWNING Star Tribune December 7, 2010
A tiny mom- and daughter-owned company in Arizona is taking aim at U.S. Bank in a class-action lawsuit that alleges the bank failed to protect them and countless other online merchants from crooks who breached the bank's credit card database.
In a lawsuit filed last month in Hennepin County and removed to U.S. District Court in Minneapolis this week, the company Paintball Punks alleges that between August and December 2009, it received nine orders totaling $11,259.91 that were fraudulently billed to U.S. Bank-issued credit cards.
That's not a huge amount, but the potential client base from U.S. Bank's $16 billion credit card portfolio drew the attention of two major law firms that specialize in class-action cases. U.S. Bank said potential damages could exceed the $5 million threshold required under the Class Action Fairness Act of 2005.
The Arizona firm sells paintball supplies online. It claims that before it shipped out any merchandise, it took all the required steps to verify cardholders' identities, including checking the security codes on the backs of credit cards and cross-referencing the shipping addresses against the cardholders' billing addresses on file with the bank.
Even so, after the actual account holders disputed the charges, U.S. Bank tapped into Paintball Punks' bank account in what's known as a "chargeback" and recouped the money from the bogus transactions.
According to the lawsuit, Minneapolis-based U.S. Bank covered up a breach of its own security systems and shifted the cost of fraudulent charges onto merchants.
[...]

Dope! Ad exec offers drugs to get his stolen laptop back

Posted:

InfoSec News: Dope! Ad exec offers drugs to get his stolen laptop back: http://www.msnbc.msn.com/id/40558954/ns/local_news-philadelphia_pa/
By David Chang NBCPhiladelphia.com 12/7/2010
A Philadelphia man used his skills as an advertising executive to devise a unique way of getting back his stolen laptop.
Kurt Shore was about to pull out of the parking lot of his Manayunk office back in early November when he realized he had forgotten something inside.
Jetting back into the office for just a minute, Shore came back to find his MacBook computer stolen from the car.
Surveillance video captured the robbery on tape, showing a man breaking into the car seconds after Shore went back inside.
[...]

Call For Papers CFS NYC

Posted:

InfoSec News: Call For Papers CFS NYC: Forwarded from: The Computer Forensics Show <fmanley (at) computerforensicshow.com>
CALL FOR PAPERS: The Computer Forensics Show
April 19-20, 2011 * New York City * NY
For some companies, it is not a question if one of their computers will be used as evidence in a legal matter, it is a question of when.
THE COMPUTER FORENSICS SHOW IS THE "DON'T MISS" EVENT OF THE YEAR FOR ALL LEGAL, ACCOUNTING, IT SECURITY, RISK MANAGEMENT, AND LAW ENFORCEMENT PROFESSIONALS
Forensic Trade Shows, LLC is proud to announce The Computer Forensics Show, April 19-20, 2011 in New York City, NY.
The event will highlight exhibits from some of the leading companies in the industry, complemented by a comprehensive conference program to provide attendees with important information about the latest technological advancement, ideas and practical information available today.
The Computer Forensics Show offers its speakers tremendous opportunities for exposure and recognition as industry leader. Your session will attract many technical professionals interested in learning from your example, expertise and experience. In appreciation of your contributions as a conference speaker, we provide the following benefits:
* Complementary speaker registration to the exhibition and full conference pass; * Complementary session passes for your colleagues to attend your session (upon request); * Presenters will receive three promotional conference passes to promote their session.
Please visit our speaker page from this year's show at http://www.computerforensicshow.com/speakers_panels.htm.
There are 6 main tracks in the conference:
Forensic Accounting - Fraud, Financial Investigations, Compliance, Best Practices, Litigation. Forensic accounting is the number one growing field in accounting today.
Legal (A) - EDD, including Litigation and Best Practice Issues.
Legal (B) - Emerging Technologies/Litigation, Data/Records Management, Reporting, and Privacy.
IT Security - For organizations that are just beginning to encounter security issues and deals with more broad issues effecting organizations today.
IT Security Advanced Track - Encompasses more complex and in-depth issues and can highlight the need for additional training.
Cyber-crime, Terrorism, and Information Warfare Track - Cyber crime and terrorism as it relates to Homeland Security, public and corporate policy, risk management, and the protection of our nation's critical infrastructures.
Additional classes will also be available to attendees: Computer Forensics - CCFE Boot Camp - 3 Days Cell Phone Forensics - 3 Days C4SEM-CJ-103 Identity Theft-Fraudulent Documents Credit: 3 C4SEM-SEC-105 Cyber Terrorism - Security Credit: 3
The Show's Conference Department is asking industry executives to submit brief abstracts on some current topics to be presented to attendees in a solo presentation or as part of a conference panel. If you are interested, please review the following guidelines and contact information, and note the submission deadlines for the conference.
Guidelines:
Formatting * Paper size - letter/8.5" width X 11.0" height. * Margins - top/bottom/left/right - 1". * Font - Times New Roman 11 point. * Paragraph Spacing - single spaced. * The submission should be sent in Microsoft Word.
The submission must include * The Presentation Title * Author Name(s) * Title * Company * Speaker Contact Information: Address * Phone Number * E-mail Address * Keywords (4-8 words)
* ABSTRACT* The presentation abstract should outline your presentation and what attendees would learn. Please remember that all the content must be strictly educational and marketing oriented papers will not be accepted. The presentation has to be oriented for: Accounting, Legal, IT Security, Risk Management, and Law Enforcement professionals.
* BIOGRAPHY* The speakers biography should be 60 to 100 words in paragraph form. These may include present position, titles, areas of professional expertise, experience, research interests, major publications, degrees, etc.
* Abstract and Biography information should not extend more than one page and will be used for our Show Guide and Website if speaking.
Please do not hesitate to include additional material regarding your presentation(s) for better evaluation.
The total presentation length is 75 minutes: speech ~ 50-60min; Q&A ~ 15-20min.
SUBMISSION DEADLINE: January 15th, 2011.
Submissions will be evaluated for originality, significance of the work, technical content, and interest to a wide audience. Speakers may also be grouped into panels when there are overlapping topics of interest.
Submissions should be in Microsoft Word and sent to Conference Coordinator at speaker at computerforensicshow.com. Please note that due to the expected volume of submissions, Forensic Trade Shows, LLC will only contact speakers who are selected.
By agreeing to speak, you grant one-time permission to Forensic Trade Shows, LLC to retain and publish a copy of your presentation. The copyright and all other rights to the presentation remain with the author(s). All rights to and use of The Computer Forensics Show name and logos are retained exclusively by its respective party.
A copy of the presentation materials should be submitted to us no later than March 4th, 2011. It should be sent in Microsoft PowerPoint (.ppt) format on the Computer Forensics Show template that will be provided to you prior to the conference. If you use any animation or active content, please include that as well. For reliability and security purposes, all presentations will be preloaded onto the presentation computers at the conference.
Note: Substitutions for speakers are only allowed under emergency circumstances, and tradeshow management must be immediately notified of any changes. All participants are selected at the discretion of show management.
Suggested topics include:
Accountant Malpractice Claims Anonymity and Proxies Authentication and Access Control Civil Litigation Class Action Disputes Computer Crime and Information Warfare Construction Solutions Corporate Governance Corporate Information Corporate Risk and Security Criminal Fraud and Deception Cases Cyber Forensics Damage Assessment Digital Forensic Case Studies Digital Forensic Processes and Workflow Models Digital Forensics and Internet Digital Law Digital Rights Management (DRM) Digital Signatures E-Discovery Employee Internet Abuse Employment and Family Law Cases Encryption and Decryption Environmental Litigation Financial Investigations and Forensic Accounting Forensics Accounting and the Internet Fraud Investigation General Commercial Disputes Identity Theft Industrial Espionage Insurance Claims and Digital Forensics Integrity of Archival Data Intellectual Property Claims International Risk and Investigations Intrusion Detection IT Security and Compliance Legal, Ethical and Policy Issues Mobile Forensics More General Criminal Cases Network Forensics New Firewall Technologies Portable Electronic Device Forensics Post-Acquisition Disputes Privacy and Data Mining Privacy issues in digital forensics Privacy Leakage Case Studies Privacy Policy Enforcement Security Education and Training Smart Card Applications Stealth Data Steganography Stylometric and Author Attribution Terrorist Use of the Internet Unauthorized Disclosure of Corporate Information
If you have any questions about The Computer Forensics Conferences, please send us an e-mail to info at computerforensicshow.com.
If you do not wish to receive news e-mails about the show, please send us an e-mail at remove at computerforensicshow.com.

WikiLeaks could be thwarted by new State Dept. system

Posted:

InfoSec News: WikiLeaks could be thwarted by new State Dept. system: http://fcw.com/articles/2010/12/07/state-department-diplopedia.aspx
By GCN Staff Dec 07, 2010
As Secretary of State Hillary Clinton launched a damage control operation to world leaders after State Department diplomatic cables were published by the WikiLeaks website, the atmosphere was calm in the Office of eDiplomacy.
That’s because cables likes the ones leaked to WikiLeaks have been replaced by Diplopedia, a highly secure system by which ambassadors and their staffs can compare notes, pass tips and even offer candid observations on world leaders, Dayo Olopade, a political reporter, writes in The Daily Beast.
Olopade recently spoke with officials in the office of eDipolmacy about cybersecurity efforts in the wake of leak of the trove of classified and unclassified diplomatic cables that span 1966 to 2010.
A team of 60 people within eDiplomacy are working on ways to modernize the way American diplomats talk to each other confidentially.
Diplopedia is an online encyclopedia of foreign affairs information, according to the State Department. It is a wiki that can be edited with an Intranet Web browser that can be accessed by authorized State Department personnel. They can contribute their experience, knowledge and expertise in the form of articles, discussion or editing of material submitted by others.
[...]

0 comments:

Post a Comment