NetSec
  corner   



HOME

LINUX

CYBERLAW

VIRTUALIZATION

Bugtraq

Packetstorm

FD

GrokLaw


RSS Feed


Netsec, comsec, infosec and IA news, research and trends

 

9.29.2008

 
Last Chance: Tell Bush to veto the RIAA/MPAA Enforcement Bill

 
From revision3.com, here is a program now available on your Tivo called HAK5 which covers network admin, black hat, white hat, and gaming. Recent episodes include topics like "hacking a wireless network with a pineapple," "analysis of a virus infection in windows," and "monitoring your network assets with spiceworks." This appears to be a locally filmed (i.e. Williamsburg) show with guests from Hampton Roads. For those of you not familiar with Revision 3, I highly recommend you check out some of the growing number of tech shows now available through this organization including Systm, Tekzilla, and Diggnation



9.28.2008

 
Paul Craig discussed a new way of owning a system by using his newly released 'Moth Trojan' today at Kiwicon in New Zealand.  Paul also took owning a kiosk to a new level with hi





9.26.2008

 
Dealing with UI redress vulnerabilities inherent to the current web - by Michal Zalewski



9.23.2008

 
Download Helix 3.0 - MD5=93a285bfa8ab93d664d508e5b12446d3



9.22.2008

 
Helix 2008R1 released (Ubuntu) changelog

 
Off topic: Security for your home/office using WowWee's WiFi-enabled Rovio. Shipping this month. Not sure what type of wireless encryption this may use if any.



9.21.2008

 
http://www.neopwn.com/ new pentesting mobile phone.



9.19.2008

 
NIST: Profile for IPv6 in the U.S. Government from Chainman



9.17.2008

 
Palin's Email Compromised and Posted to Wikileaks



9.16.2008

 
Student faces charges for hack-and-tell from Chainman

 
Berners-Lee of W3C says websites should have a trustworthiness label.



9.13.2008

 
Air Force Cyber Command Could Return, With Nukes



9.11.2008

 
San Francisco hunts for mystery device on city network from Chainman



9.10.2008

 
Online Posse Assembles, to Unmask Russia's Hackers from Ryan

 
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications - from Brett

 
Why All the Data Breaches? Businesses Just Don’t Care from Chainman



9.08.2008

 
One Bad Apple from Luis

 
Pentagon debates development of offensive cyberspace capabilities - from Chainman

More on AF Cyber Hiatus



9.06.2008

 
The CERT Virtual Training Environment (VTE) - A revolutionary resource for information assurance, incident response and computer forensic training, with over 500 hours of material available. VTE blends the best of classroom instruction and self-paced online training, delivering training courses, anytime access to answers, and hands-on training labs all through a standard Web browser. From Dale.



9.04.2008

 
IPv6 = Metavulnerability? - Yet another Remote IPv6 (ICMPv6) Flaw in FreeBSD



9.03.2008

 
Immunity Debug Register (DR) Linux Rootkit (loads via insmod so monolithic kernels with the module loader omitted should not be vulnerable)

 
Google unveils open-source browser - Chrome - Proof-of-Concept DOS Exploit Released





This page is powered by Blogger.


Site Meter Locations of visitors to this page