USENIX HotSec '10 Submission Deadline Approaching |
- USENIX HotSec '10 Submission Deadline Approaching
- Cyberattack on Google Said to Hit Password System
- Future of SF admin Terry Childs now in jury's hands
- Politically Motivated Attacks Could Force Enterprises To Reshape Defenses
- Your BlackBerry's dirty little security secret
- [Dataloss Weekly Summary] Week of Sunday, April 11, 2010
- Final CFP: TrustBus'10 -- Deadline Extended
- iPad Used To Govern Norway -- But What About Security?
- Linux Advisory Watch: April 16th, 2010
- Microsoft wants pacemaker password tattoos
- Security researchers demo Cisco Wi-Fi flaws
- An infosec revolution in Boston
- Taking Penetration Testing In-House
USENIX HotSec '10 Submission Deadline Approaching Posted: InfoSec News: USENIX HotSec '10 Submission Deadline Approaching: Forwarded from: Lionel Garth Jones <lgj (at) usenix.org> I'm writing to remind you that the submission deadline for the 5th USENIX Workshop on Hot Topics in Security (HotSec '10) is approaching. Please submit all work by 11:59 p.m. PDT on May 3, 2010. http://www.usenix. [...] |
Cyberattack on Google Said to Hit Password System Posted: InfoSec News: Cyberattack on Google Said to Hit Password System: http://www.nytimes.com/2010/04/20/technology/20google.html By John Markoff The New York Times April 19, 2010 Ever since Google disclosed in January that Internet intruders had stolen information from its computers, the exact nature and extent of the theft has been a closely guarded company secret. But a person with direct knowledge of the investigation now says that the losses included one of Google's crown jewels, a password system that controls access by millions of users worldwide to almost all of the company's Web services, including e-mail and business applications. The program, code named Gaia for the Greek goddess of the earth, was attacked in a lightning raid taking less than two days last December, the person said. Described publicly only once at a technical conference four years ago, the software is intended to enable users and employees to sign in with their password just once to operate a range of services. The intruders do not appear to have stolen passwords of Gmail users, and the company quickly started making significant changes to the security of its networks after the intrusions. But the theft leaves open the possibility, however faint, that the intruders may find weaknesses that Google might not even be aware of, independent computer experts said. The new details seem likely to increase the debate about the security and privacy of vast computing systems such as Google's that now centralize the personal information of millions of individuals and businesses. Because vast amounts of digital information are stored in one place, popularly referred to as 'cloud' computing, a single breach can lead to disastrous losses. [...] |
Future of SF admin Terry Childs now in jury's hands Posted: InfoSec News: Future of SF admin Terry Childs now in jury's hands: http://www.computerworld.com/s/article/9175821/Future_of_SF_admin_Terry_Childs_now_in_jury_s_hands?taxonomyId=17 By Robert McMillan IDG News Service April 19, 2010 Terry Childs' battle to avoid being convicted over what his supporters characterize as a workplace dispute gone wrong is almost over. [...] |
Politically Motivated Attacks Could Force Enterprises To Reshape Defenses Posted: InfoSec News: Politically Motivated Attacks Could Force Enterprises To Reshape Defenses: http://www.darkreading.com/securityservices/security/cybercrime/showArticle.jhtml?articleID=224400721 By Tim Wilson DarkReading April 19, 2010 An emerging wave of politically motivated cyberattacks is reaching critical mass and threatens to redefine the way enterprises build their [...] |
Your BlackBerry's dirty little security secret Posted: InfoSec News: Your BlackBerry's dirty little security secret: http://www.csoonline.com/article/591358/Your_BlackBerry_s_dirty_little_security_secret By Bill Brenner Senior Editor CSO April 19, 2010 Tyler Shields, senior member of the Veracode Research Lab, spends a lot of time picking apart those BlackBerry devices that are ubiquitous across the enterprise. [...] |
[Dataloss Weekly Summary] Week of Sunday, April 11, 2010 Posted: InfoSec News: [Dataloss Weekly Summary] Week of Sunday, April 11, 2010: ======================================================================== Open Security Foundation - DataLossDB Weekly Summary Week of Sunday, April 11, 2010 6 Incidents Added. ======================================================================== [...] |
Final CFP: TrustBus'10 -- Deadline Extended Posted: InfoSec News: Final CFP: TrustBus'10 -- Deadline Extended: Forwarded from: "M. Carmen Fernández Gago" <mcgago@ (at) cc.uma.es> ** Apologies for multiple copies ** *Call for Papers* *6th International Workshop on* *SECURITY and TRUST MANAGEMENT (STM'10)* Athens, Greece 23-24 September 2010 http://www.isac.uma. [...] |
iPad Used To Govern Norway -- But What About Security? Posted: InfoSec News: iPad Used To Govern Norway -- But What About Security?: http://www.sci-tech-today.com/news/Brand-New-iPad-Used-To-Run-Norway/story.xhtml?story_id=10000B5ZXF4W&full_skip=1 By Jennifer LeClaire Sci-Tech Today April 16, 2010 Norway Prime Minister Jens Stoltenberg used his brand-new Apple iPad to govern from a New York airport. [...] |
Linux Advisory Watch: April 16th, 2010 Posted: InfoSec News: Linux Advisory Watch: April 16th, 2010: +----------------------------------------------------------------------+ | LinuxSecurity.com Linux Advisory Watch | | April 16th, 2010 Volume 11, Number 16 | | | [...] |
Microsoft wants pacemaker password tattoos Posted: InfoSec News: Microsoft wants pacemaker password tattoos: http://www.theregister.co.uk/2010/04/16/pacemaker_security_tattoo/ By Dan Goodin in San Francisco The Register 16th April 2010 A Microsoft researcher has suggested tattooing passwords on patients with pacemakers and other implanted medical devices to ensure the [...] |
Security researchers demo Cisco Wi-Fi flaws Posted: InfoSec News: Security researchers demo Cisco Wi-Fi flaws: http://www.zdnet.co.uk/news/security-threats/2010/04/16/security-researchers-demo-cisco-wi-fi-flaws-40088653/ By Richard Thurston ZDNet UK 16 April, 2010 Two generations of Cisco wireless LAN equipment contain a range of vulnerabilities, researchers have told the Black Hat security conference. [...] |
An infosec revolution in Boston Posted: InfoSec News: An infosec revolution in Boston: http://www.csoonline.com/article/590873/An_infosec_revolution_in_Boston By Bill Brenner Senior Editor CSO April 14, 2010 If your focus is information security, Boston is the place to be next week. A perfect storm of events is brewing, and I've come to anticipate [...] |
Taking Penetration Testing In-House Posted: InfoSec News: Taking Penetration Testing In-House: http://www.darkreading.com/vulnerability_management/security/management/showArticle.jhtml?articleID=224400589 By Keith Ferrell Special To Dark Reading Apr 16, 2010 Conducting penetration testing in-house rather than using an outside consultant is worth considering for reasons of both cost and security expertise -- but it's also a step not to be taken lightly. "The advantage of having in-house penetration testers is the focus they provide," says Chris Nickerson, founder of security firm Lares Consulting. "They're able to keep track of the latest exploits and vulnerabilities, constantly monitor systems, and practice and sharpen their skills. But in order to achieve those benefits, they have to be focused. " Nickerson points out that while some really large enterprises are fielding teams wholly dedicated to testing, for most companies pen tests are only part of the testers' responsibilities. "It's all too common to find penetration tests delayed or put off because the tester has too many other open tickets to deal with," he says. While even a part-time pen-test specialist on staff can be a step in the right direction, it can also be risky. "The variety of tools available for pen tests today is remarkable, and I pretty much applaud them all," he says. "Metasploit, Canvas, Core, Nessus, and others have spent a lot of time ensuring that installing their agents don't blow the boxes that are being tested. That's the default: Once the agent is installed and it's determined whether or not the exploit works, the agent is uninstalled." [...] |
You are subscribed to email updates from [ISN] InfoSec News Mailing List To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment