NetSec
  corner   



HOME

LINUX

CYBERLAW

VIRTUALIZATION

Bugtraq

Packetstorm

FD

GrokLaw


RSS Feed


Netsec, comsec, infosec and IA news, research and trends

 

4.28.2007

 
File Scrub removes sensitive data and metadata from files and is free for use of USG agencies and contractors. File Scrub was developed at Los Alamos National Laboratory and is currently funded by the National Nuclear Security Administration (NNSA) - from Chainman



4.26.2007

 
Cyber Insecurity: Hackers are Penetrating Federal Systems and Critical Infrastructure



4.25.2007

 
Culture of Fear: Poetry Professor Becomes Terror Suspect

 
Secustick gives false sense of security

 
New DNS RPC Exploit.

 
I tend to dislike most InfoWorld articles but this is an exception:

Spy Act Only Protects Vendors and Their DRM

 
Toward a Functional Model of Information Warfare

 
Smart USB gone Bad

 
Website: NTBugTraq

 
UK official calls for international privacy standards



4.23.2007

 
DoD SNAC - Disabling USB Devices

 
Online Impersonations: No Validation Required

 
CNET: Don't let your navigation system fool you



4.22.2007

 
University VP and the Patriot Act



4.19.2007

 
Notes on Vista forensics -- From SecurityFocus

 
Options for Mounting DD Images

 
SecuStick - Self Destructing Disk Encryption

 
NIST - "Hacking" Case Test Image

 
State Department got mail _ and hackers

 
Call For Papers - 1st Annual ACM Computer Security Architecture Workshop



4.18.2007

 
Classics: Software Forensics: Can We Track Code to its Authors? by Spafford



4.17.2007

 
The 5th ACM Workshop on Recurring Malcode (WORM 2007)

 
PDF: Taking Action to Protect Sensitive Information

 
Top 10 Steps to Ethical Software Practice

 
Microsoft Asks: What is security?

 
Internet Crime: Will Businesses pay twice?



4.16.2007

 

 
DFRWS 2007 August 13-15 - Registration Open



4.15.2007

 
Announcing: Bruce Schneier's Second Annual Movie-Plot Threat Contest



4.14.2007

 
2006 FISMA FEDERAL COMPUTER SECURITY REPORT CARD



4.13.2007

 
The Volokh Conspiracy (BLOG) The Rhetoric of Opposition to Self-Help:

 
Grisoft: Free AVG Anti-rootkit software.

 
World of Warcraft: No end in sight to hacking of 'WoW' accounts

 
eWeek: Uncle Sam Gets a C-Minus for Information Security



4.12.2007

 
Anatomy of an animated cursor attack

 
IBM White Paper: The High Stakes of Security: Protecting Your Brand



4.11.2007

 
Volatools: Integrating Volatile Memory into the Digital Investigation Process - Download/Buy Volatools

 
Physical memory forensics by Mariusz Burdach

 
Memparser is a memory forensics analysis tool for microsoft windows systems.

 
Searching for processes and threads in Microsoft Windows memory dumps



4.10.2007

 
The First Amendment as Criminal Procedure by Daniel Solove

 
Eastern European crime in on ANI attacks

 
DEFCON 15 Call for Papers



4.09.2007

 
ShmooCon 2007 Videos



4.07.2007

 
Court Okays Counter-Hack of eBay Hacker's Computer

 
Tony Soprano's laptop



4.06.2007

 
NASA hacker Gary McKinnon should NOT go to US jail

 
The Final' Final Nail' in WEP's coffin?

 
Researchers: E-passports pose security risk



4.05.2007

 
New class of attack targets embedded devices

 
Voting systems company threatens Dutch state - “Buy my company now or you won’t have provincial elections”

 
The Success of Failure

 
The Emperor’s New Security Indicators - An evaluation of website authentication and the effect of role playing on usability studies

 
Four steps to battling botnets

 
Hackers now offer subscription services, support for their malware (But wait, there's more! They'll even guarantee results)

 
Windows cursor patch gone wrong

 


All Your Symantec Are Belong to US!



4.04.2007

 
How To Come Back From A Cyber Attack

 
[Dailydave] Stereotyping DoS and Don'ts

 
PDF: Stopping Zombies, Botnets, and Other Email-borne Threats Dec 2006

 
PDF: Physical Security in Mission Critical Facilities

 
PDF: Anti-phishing: Best Practice for Corporations and Institutes Nov 2005

 
PDF: Organized Crime and the Internet Dec 2006

 
PDF: 12 Steps to Avoid Phishing Scams Jun 2005



4.03.2007

 
DNS Security Basics II

 
Free Ride: Federal CyberService Scholarships

 
Video: Exploiting Vista ANI Flaw with Metasploit

 
BLOG for sysadmins: In The Trenches

 
EMI Drops DRM, iTunes to sell Unencumbered Digital Tracks - Other labels are expected to follow. The major labels are finally waking up to the market reality of 1998. If only they could go back in time, perhaps they would be able to retain their consumer base. Technology is disruptive to established hierarchies (think printing press) and the market is cruel to those who disregard this change.



4.02.2007

 
Free home wireless from Google.

 
Jefferson Lab hosts "Science is Cool" Open House on Saturday, April 21 - 9AM - 2PM

 
ZERT Patch for ANI 0day: Stack buffer overflow in ANI Handling under Microsoft Windows 0Day - Test to see if your browser is 0wnable



4.01.2007

 
From Risks: Proving NON copyright infringement

 
Wireless penetration testing framework - nice chart!





This page is powered by Blogger.


Site Meter Locations of visitors to this page