NetSec
  corner   



HOME

LINUX

CYBERLAW

VIRTUALIZATION

Bugtraq

Packetstorm

FD

GrokLaw


RSS Feed


Netsec, comsec, infosec and IA news, research and trends

 

8.09.2008

 
Hardware Trojans - Professor Fouad Kiamilev and Ryan Hoover of University of Delaware produced some interesting hardware Trojan demos using optical, radio, and thermal sources to transmit AES keys from a compromised system.

 
The 11th U.S. District Court has issued an injunction against the presentation "Anatomy of a Subway Attack" by Russel Ryan, Zack Anderson, and Allesandro Chiesa which was scheduled for tomorrow at 1pm. According to the EFF, the plaintiffs will not likely prevail on their established legal rationale which was the CFAA prohibition against knowingly causing "the transmission of a program, information, code, or command, and as a result of such conduct, intentionally" causing "damage without authorization, to a protected computer." If this stands it could have a chilling effect on free speech.



8.07.2008

 
Defcon 16 Presentations



8.06.2008

 
Black Hat USA 2008 Presentations

Professor Ian Angell from the London School of Economics has been my favorite presenter thus far [PPT]. He's giving the keynote at Defcon and I plan on seeing that as well. He offered some rigorous critiques of IS, AI, misapplication of statistics, and the general fallibility of mankind. Big picture topics that served to broaden the scope of the security discussion society really needs to have one day (but will never happen).

There are so many good talks that it is difficult to choose. Some favorites covered hardware rootkits, attacking virtualization, and writing shellcode for Cisco devices. The presenters of the Cisco shellcode talk picked up where Mike Lynn left off in 2005. Cisco's security practices would likely never be tolerated in a commercial OS (of course, consumers put up with a lot due to ignorance or laziness) - no virtual memory implementation, no process separation, everything runs in a single flat address space with full system privs. As a result, shell code is easy to write and exploitation even easier as every process has full rights to all heap data.



8.04.2008

 
California Secretary of State Debra Bowen supports paper ballots - Top to bottom review of e-Voting systems included code review and pen-tests (led by Matt Bishop) - 0wn the Vote! The Diebold (GEMS Server and Accuvote) system runs on an unpatched Windows 2000 Server!

 
DNA identification may not be reliable

 
Blue Cross and Blue Shield exposes 202,000 customers





This page is powered by Blogger.


Site Meter Locations of visitors to this page