NetSec
  corner   



HOME

LINUX

CYBERLAW

VIRTUALIZATION

Bugtraq

Packetstorm

FD

GrokLaw


RSS Feed


Netsec, comsec, infosec and IA news, research and trends

 

7.30.2007

 
Most vote machines lose test to hackers

 
BTSniff - Bluetooth sniffing under *nix

 
USENIX Workshop on Offensive Technologies (W00T!)



7.29.2007

 
Spam goes back to the future



7.28.2007

 
ISP (Cox Communciations) uses DNS to redirect from IRC to bot cleaner

E-cards (storm worm) don’t like virtual environments



7.26.2007

 
Anti-(Anti-Malware) Malware detects if in VM environment and reboots

 
OpenBSD Foundation formed to support the various Open* projects

 
Exploitable bugs in EnCase and The Sleuth Kit to be announced at Black Hat 2007

 
Governor for a Day? - Nevada governor accidentally posts Outlook password

 
GAO CyberCrime Report - Industry should be wary of Congress getting involved (yet again) in "fixing" corporate information security practices as they seem to have an inverse Midas Touch... everything they touch turns to ****.



7.25.2007

 
Duped - Can brain scans uncover lies? - More on the (mis)use of fMRI for lie detection

 

Congress: P2P networks harm national security - O Rly?




7.24.2007

 
Watchfire to demonstrate 'dangling pointer' exploitation at Black Hat Vegas

 
An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments by Tavis Ormandy

 
Glamour Crypto-trojan based on wnspoem toolkit

 
Mozilla caught napping on URL protocol handling flaw

 
The Pwnie Awards - An annual award ceremony celebrating (or making fun of) the achievements and failures of security researchers and the wider security community. Results TBA Next Week in Vegas.




7.23.2007

 
Exploiting the iPhone - Video - Preliminary Paper - "Security Evaluation of Apple’s iPhone"

 
ToorCon 8 Videos

 
Independent Security Evaluators Crack the iPhone via both WiFi and Web Content - More details will likely emerge at Black Hat Vegas 2007

 
FIPS 140-3: Security Requirements for Cryptographic Modules - Draft Opened for Comment



7.20.2007

 
Fast-Flux Service Networks

 
How to implement SSL or TLS Secure Communications

 
US v. Forrester Decision - 9th Circuit holds that the 4th Amendment does not protect against the search and seizure of administrative data such as to/from addresses of email, IP addresses of websites, or total volume of information transmitted

 
EFF - FOIA Litigation: Abuse of National Security Letters (NSLs)

 
Microsoft Copy Protection Cracked Again



7.19.2007

 
Securing Record Communications: The TSEC/KW-26 by Melville Klein (Center for Cryptologic History) provides some enjoyable light reading.



7.17.2007

 
THC presents: a crypto paper analyzing the database authentication mechansim
used by oracle. Paper / Cracker / Client app / Crypto Utility

 
Anti Forensics: making computer forensics hard



7.16.2007

 
Correspondent Inference Theory and Terrorism

 
Mac OS-X Worm on the Horizon?



7.14.2007

 
The Athens Affair

 
Windows Vista: Forensic Exam Easier

 
Helix 1.9 Released



7.13.2007

 
Dangerous Java Flaw Found

 
UCSD Secure Erase Utility

 
Information Security Law Resources - This site provides a very useful clearinghouse of international, national, and state laws regarding INFOSEC, PKI, and cybercrime

 
England's helmet camera initiative to go countrywide



7.12.2007

 
CERT: Securing your browser. Not very recent, but still relevant and with some many good resource links.



7.11.2007

 
Your first girlfriend -- and the other things search engines store about you - From Andy



7.09.2007

 
Justine Aitel - The IPO of 0day - Interesting Stats: Average 0day lifetime: 348 days, Shortest life: 99 days, Longest life: 1080 (3 years)



7.07.2007

 
Feds attack software defined radio, because users can bypass "security measures". The Software Defined Radio Forum responds with claims new measures are simply an attempt at "security through obscurity".



7.06.2007

 
An Auction Site for Vulnerabilities

 
[DailyDave] - .Net 0-Day



7.03.2007

 
TPMkit: Breaking the Legend of Trusted Computing(TC [TPM]) and Vista(BitLocker) - Planned Black Hat demo off the schedule with no explanation given



7.01.2007

 
YAATMH - Police Search For Thieves Who Reprogrammed ATM





This page is powered by Blogger.


Site Meter Locations of visitors to this page