USENIX Security '11 Call for Papers Now Available |
- USENIX Security '11 Call for Papers Now Available
- Mattel disavows Barbie Video Girl porn link
- OpenBSD Project Finds Two Bugs In Software's IPsec Implementation
- Indictment says hacker took $274K from Digital River
- VA employees tap cloud apps on their own, posing security risk
- Secure SCADA set to prosper in the future
- System Glitch Confuses Bank's Customers
- 79% of web users put personal info in passwords
USENIX Security '11 Call for Papers Now Available Posted: InfoSec News: USENIX Security '11 Call for Papers Now Available: Forwarded from: Lionel Garth Jones <lgj (at) usenix.org> On behalf of the 20th USENIX Security Symposium (USENIX Security '11) program committee, I am inviting you to submit high-quality papers covering novel and scientifically significant practical works in security or applied cryptography. [...] |
Mattel disavows Barbie Video Girl porn link Posted: InfoSec News: Mattel disavows Barbie Video Girl porn link: http://www.computerworld.com/s/article/9202201/Mattel_disavows_Barbie_Video_Girl_porn_link By Robert McMillan IDG News Service December 22, 2010 Somehow somebody put a link to a pornographic chat site on a Barbie.com page used to promote Barbie Video Girl, a version of the iconic doll [...] |
OpenBSD Project Finds Two Bugs In Software's IPsec Implementation Posted: InfoSec News: OpenBSD Project Finds Two Bugs In Software's IPsec Implementation: http://www.darkreading.com/database-security/167901020/security/attacks-breaches/228900060/openbsd-project-finds-two-bugs-in-software-s-ipsec-implementation.html By Mathew J. Schwartz, InformationWeek Special to Dark Reading Dec 22, 2010 The OpenBSD project has found two bugs in how OpenBSD, a Unix-like open source operating system, implements Internet protocol security (IPsec). The bugs are of interest given the recent allegation made by Gregory Perry, former CTO of now-defunct Federal Bureau of Investigation contractor Network Security Technology (NetSec), that the FBI created a backdoor in the OpenBSD code base, specifically in how it implements IPsec. He also alleged that multiple developers involved in contributing code to OpenBSD were on the payroll of NetSec, and that the FBI had hired it to create the backdoors. Are the bugs a smoking gun? According to Theo de Raadt, the founder and leader of the OpenBSD project, one IPsec bug in OpenBSD relates to a "CBC oracle problem," and was fixed in the software crypto stack by Angelos Keromytis, the architect and primary developer for its IPsec, but ignored in device drivers, overseen by device driver author Jason Wright. Interestingly, both men had worked for NetSec, at different times. "Neither Jason nor Angelos were working for NetSec at that time, so I think this was just an accident," said de Raadt. "Pretty serious accident." [...] |
Indictment says hacker took $274K from Digital River Posted: InfoSec News: Indictment says hacker took $274K from Digital River: http://www.startribune.com/local/112307894.html By PAUL WALSH Star Tribune December 22, 2010 Federal authorities say a Texas hacker stole more than a quarter-million dollars from a subsidiary of Digital River Inc., the Eden Prairie-based e-commerce company, by redirecting electronic payment transfers to his personal account. In an indictment unsealed Tuesday in federal court in Minneapolis, Jeremey Parker, 35, of Houston, was charged with computer fraud and wire fraud. According to the indictment: From Dec. 23, 2008, through Oct. 15, 2009, Parker hacked into the computer network to take $274,000 belonging to Digital River through a subsidiary, SWReg Inc. [...] |
VA employees tap cloud apps on their own, posing security risk Posted: InfoSec News: VA employees tap cloud apps on their own, posing security risk: http://www.nextgov.com/nextgov/ng_20101222_6852.php By Bob Brewin Nextgov 12/22/2010 Computer savvy Veterans Affairs Department employees have started to use Internet-based services and tools that the VA does not provide on its systems, presenting a security challenge, according to its chief [...] |
Secure SCADA set to prosper in the future Posted: InfoSec News: Secure SCADA set to prosper in the future: http://www.controlengeurope.com/article/38793/Secure-SCADA-set-to-prosper-in-the-future.aspx Control Engineering Europe 20 December 2010 New analysis from Frost & Sullivan indicates that the SCADA market is among the most rapidly growing control systems markets in the world. [...] |
System Glitch Confuses Bank's Customers Posted: InfoSec News: System Glitch Confuses Bank's Customers: http://inaudit.com/audit/it-audit/system-glitch-confuses-bank%E2%80%99s-customers-3704/ By Bob Styran IN Audit December 23, 2010 Grupo Santander, a banking firm based in Spain, has reported to the Financial Services Authority (FSA) a system glitch with its printers [...] |
79% of web users put personal info in passwords Posted: InfoSec News: 79% of web users put personal info in passwords: http://www.pcadvisor.co.uk/news/index.cfm?NewsID=3254182 By Carrie-Ann Skinner PC Advisor December 20, 2010 Nearly four in five (79 percent) web users admit to using personal information and phrases in passwords, says Check Point. Research by the security firm, which created the ZoneAlarm software, revealed more than a quarter (26 percent) reuse the same passwords for email, online banking or social networking accounts, while 8 percent claim they copy passwords from online lists of 'good' passwords. Furthermore, more than 22 percent have had their social networking accounts hacked, and the same amount have experienced email hacking. "Especially now, with online shopping on the rise this holiday season, consumers need to be aware of the importance of passwords and the fact that hackers are getting more and more sophisticated in cracking them," said Bari Abdul, vice-president of consumer sales at Check Point. [...] |
You are subscribed to email updates from [ISN] InfoSec News Mailing List To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment