NetSec
  corner   



HOME

LINUX

CYBERLAW

VIRTUALIZATION

Bugtraq

Packetstorm

FD

GrokLaw


RSS Feed


Netsec, comsec, infosec and IA news, research and trends

 

11.29.2012

 
iPhone Forensics – Analysis of iOS 5 backups : Part 1



11.15.2012

 
"The convergence of biological and computer viruses" from Jaren



11.12.2012

 
Support Forums Reveal Soft Underbelly of Critical Infrastructure

"We hear a lot about vulnerabilities in industrial control system (ICS) software. In fact, that’s all we seem to hear about these days. The truth is: there’s a lot to write about. In just the last month, the Department of Homeland Security’s ICS-CERT warned its members about the ability of  sophisticated – and even unskilled – attackers to use tools like the Shodan and ERIPP search engines to locate and attack vulnerable industrial control systems (PDF) that are accessible from the public Internet. In the meantime, every couple of weeks brings revelations about serious and remotely exploitable software holes. Most recently, ICS-CERT warned about a critical vulnerability EOScada (PDF), a Windows-based Energy Management System that is used to configure and manage intelligent electronic devices (IEDs) used in electrical, water, sewage and gas applications."

Found from Slashdot ( Support Forums Reveal SCADA Infections )

 





NASA DTN Protocol: Interplanetary Internet, How It Works, What LEGOS Have to To With It

NASA is calling it the interplanetary Internet, and announcements have been hitting in recent weeks regarding the sending of the first emails, voicemails and, of late, news of an experiment that involved remote controlling of a LEGO space robot with it. But what’s truly cool is the technology enabling it — it’s a protocol called Delay-Tolerant Networking, better known as DTN.

At its heart is Vint Cerf’s Bundle Protocol (BP), a version of the IP protocol he helped develop to pioneer the Internet decades ago.



 
The New Face of Energy Insecurity

The future of energy insecurity has arrived. In August, a devastating cyber attack rocked one of the world’s most powerful oil companies, Saudi Aramco, Riyadh’s state-owned giant, rendering thirty thousand of its computers useless. This was no garden-variety breach. In the eyes of U.S. defense secretary Leon Panetta, it was “probably the most destructive attack that the private sector has seen to date.”

From Slashdot ( The Cyber Threat To the Global Oil Supply )



11.11.2012

 
Yet another Adobe 0-day... "Security Firm Finds Zero-day Exploit Capable of Bypassing Adobe Reader Sandbox" from Gerald



11.07.2012

 
Killing the Computer to Save It



11.06.2012

 

Virtual machine used to steal crypto keys from other VM on same server

 

Piercing a key defense found in cloud environments such as Amazon's EC2 service, scientists have devised a virtual machine that can extract private cryptographic keys stored on a separate virtual machine when it resides on the same piece of hardware.




11.05.2012

 
Megaupload and The Government's Attack on Cloud Computing  - 

"the government's approach should terrify any user of cloud computer services--not to mention the providers.  The government maintains that Mr. Goodwin lost his property rights in his data by storing it on a cloud computing service."





This page is powered by Blogger.


Site Meter Locations of visitors to this page