NetSec
  corner   



HOME

LINUX

CYBERLAW

VIRTUALIZATION

Bugtraq

Packetstorm

FD

GrokLaw


RSS Feed


Netsec, comsec, infosec and IA news, research and trends

 

8.31.2007

 
Teen cracks AU$84 million porn filter in 30 minutes

 
Monster warns victims, pledges better defense

 
CyberSpeak Podcast - Two Former Federal Agents Talk About Computer Forensics, Network Security and Computer Crime



8.30.2007

 
Financial Cryptography and Data Security 2008 - Call for Papers

 
Reducing Shoulder-surfing by Using Gaze-based Password Entry

 
EFF Challenges Bogus Patent on Internet Subdomains



8.28.2007

 
Hacking Germany's New Computer Crime Law

 
Report: Germans spot Chinese spy attacks



8.25.2007

 
How to Steal Cars – A Practical Attack on KeeLoq from the Crypto 2007 rump session

 
Finding JTAG on the iPhone



8.24.2007

 
Cell phone signals could provide bird’s-eye view of crises and emergency response - from Andy

WIPER - The Integrated Wireless Phone Based Emergency Response System



8.22.2007

 
FBI launches cybersecurity project - from Keith



8.21.2007

 
Nothing new here - Monster.com hacked, 1.6 million records with personal info uploaded to remote webserver.

 
Speaking of Bad Guys

 
"Safe Bedside Table"

 
Pretty good ideas:
The 10 Commandments for New Linux Users

 
Wonderful bedtime stories - The Metasploit (wiki) Book



8.16.2007

 
Design flaw in AS3 socket handling allows port probing

 
Source Code Subpoena Request as Legal Defense Tactic

 
U.S. legal time changing to UTC

 
Delete This! - A series of legal events means that companies that have no business reason to retain documents or records may be compelled to create and retain such records just so they can become available for discovery.

 
Storm Worm Strikes Back

 
Sprint to offer WiMAX-enabled Nokia N800 in 2008



8.15.2007

 
Will security firms detect police spyware?

 



 
Helix 1.9a Released



8.13.2007

 
Phenoelit Shuts Down - German Law Criminalizes Distribution of Exploit Code - Do you miss the Default Password List? Here is a US Mirror

 
David Litchfield - Blackhat 2007: Oracle Forensics

Oracle Forensics Part 5: Finding Evidence of Data Theft in the Absence of Auditing



8.12.2007

 
Business as usual over at MS (Preparing for patch Tuesday)



8.10.2007

 
Some common misconceptions about ARP cache poisoning



8.09.2007

 
Interesting new tool
"Mandiant has released a free tool aimed at incident handlers, called Red Curtain. The purpose of the tool is to highlight which files may be suspicious and require a closer look by investigators. The tool scores files based on some interesting characteristics including entropy (how random the file is, which may be an indication of encryption), indications of packing, specific signatures of compilers and packers, digital signatures, etc."

 
Older but still worth reading: Stefan Kopsell - How to Achieve Blocking Resistance for Existing Systems - Enabling Anonymous Web Surfing



8.08.2007

 
CCCamp 2007 features a talk from the A5 Cracking Project about GSM Rainbow Tables

 
Jerome AthiaS - "Speeding up the exploit development process" - MSF eXploit Builder

 
Bring Down Internet Explorer In Six Words

Evil Java Full-Screen PopUp



8.07.2007

 
CSIS Paper: Threats when using Online Social Networks by Dennis Rand

 
Defcon 15 Presentations

 
The Volatility Framework: Volatile memory artifact extraction utility framework

 
Defcon 15: To catch a lousy reporter



8.02.2007

 
Black Hat 2007 Presentations

 
Dr. Charlie Miller of ISE is going to post his presentation on Hacking Leopard (OS-X) and the iPhone soon (he says) - In his talk, he repeatedly emphasized how trivially easy it is to hack OS-X due to the rampant use of out of date open source software and lack of security features like stack randomization.

 
Breaking Forensics Software: Weaknesses in Critical Evidence Collection

 
Tactical Exploitation - HD Moore and Valsmith

 
Pwnie Award Winners Announced - For some reason, none of the vendors showed up to claim the prize for the "Lamest Vendor Response Award"?

 
BotHunter is a novel, dialog-correlation-based engine (patent-pending), which recognizes the communication patterns of malware-infected computers within your network perimeter. BotHunter is a passive traffic monitoring system, which ties together the dialog trail of inbound intrusion alarms with those outbound communication patterns that are highly indicative of successful local host infection. When a sequence of in and outbound dialog warnings are found to match BotHunter's infection dialog model, a consolidated report is produced to capture all of the relevant events and event sources that played a role during the infection process.
The DShield article is here.



8.01.2007

 
Crashing e-Passport Readers

 
Utility evades Vista kernel defenses - from Andy

 
Pwnie Award Nominees Announced

Sun for some reason decided to bring back a telnetd command prompt format string vulnerability from 1994





This page is powered by Blogger.


Site Meter Locations of visitors to this page