NetSec
  corner   



HOME

LINUX

CYBERLAW

VIRTUALIZATION

Bugtraq

Packetstorm

FD

GrokLaw


RSS Feed


Netsec, comsec, infosec and IA news, research and trends

 

11.30.2006

 
Toughening E-voting Standards?

 
Who will stop the RIAA?



11.29.2006

 
Disneyland Launches Biometric Ticketing

 
Stephen Northcutt of SANS: "The Hard Realities of IT Outsourcing"



11.27.2006

 
Devastating mobile attack under spotlight



11.24.2006

 
Copyright Office publishes digital exemptions

 
Introducing Stealth Malware Taxonomy by Joanna Rutkowska

 
Mac OS X Kernel Hoe



11.22.2006

 
FireFox Password Manager Flaw w/ POC

 
According to Mark Rasch, "...the Vista EULA pushes contract law to the limit."



11.21.2006

 
Timing Attack on RSA - "On the Power of Simple Branch Prediction Analysis"

 
City of Portsmouth public schools are seeking a Network Security Engineer

 
M$ makes claim on Linux code

 
Homebrew Nuclear Fusion



11.20.2006

 
The Week of Oracle Database Bugs - "Based on the great idea of H D Moore "Month of Browser Bugs" and LMH "Month of Kernel Bugs", we are proud to announce that we are starting on December the "Week of Oracle Database Bugs""

 
New robot can sense damage, compensate from Stephen



11.18.2006

 
Universal sues MySpace for copyright violations from Daniel



11.17.2006

 
Time Machine - Records network traffic stream to support later analysis or investigation. Stefan Kornexl's thesis "High-Performance Packet Recording for Network Intrusion Detection" explains more.

 
TCPA and Palladium - from DC 0xAh



11.16.2006

 
Implementing and Detecting a PCI Rootkit by John Heasman

 
sHype - a hypervisor security architecture for multilevel security (IBM Research Hypervisor Hackers Guide). IBM extends the Trusted Computing Group specification to Virtual Machines with the Virtual Trusted Platform Module.

 
Sneak Peek at the CensorNet by the OpenNet Initiative

 
New DHS Data-Mining System may violate the Privacy Act of 1974

 
Sen. Allen apparently could not have even mounted a recount in last week's elections due to the fact that most of Virginia's voting machines lack any form of a verifiable paper trail, there would have been nothing to recount. In other e-Voting news, Sarasota, FL. has voted to return to using paper ballots in 2008.

 
Sans 2006 top 20 Internet Security Attack Targets (i.e. the list of shame)



11.15.2006

 
Miniature Computers That Can Break Your Network Wide Open



11.14.2006

 
Microsoft Security Bulletin Summary for November, 2006

 
Court shuts down alleged spyware operation

 
Microsoft unleashes improved Firefox
The open source community is in a state of shock this morning at the news that Microsoft has released a version (or here) of popular browser Firefox.
Download it here, but, check the minimum requirements first.



11.12.2006

 
IEEE Information Assurance Standards Committee (IASC) Balloting Opportunity



11.11.2006

 
Making sense of the USB standard - USB Descriptors

 
Disabling Last Access Time in Windows Vista to improve NTFS performance



11.10.2006

 
The Wireless Networking in the Developing World book can be freely downloaded as pdf files as a whole or in single chapters. Solid wireless\radio\DIY-antenna\physics\linux primer; entire chapter on technical\physical security.



11.09.2006

 
Opportunity: System design and support - Active Directory, Linux, Exchange, Sidewinder Firewalls, etc. Email me if you have the qualifications or experience.

 
Microsoft to Pay Novell $348 Million

 
Bad News - M$ Assimilates Sysinternals



11.08.2006

 
Cisco Security Advisory: Multiple Vulnerabilities in Cisco Secure Desktop

 
Using Nepenthes Honeypots to Detect Common Malware
by Jamie Riden
"This article describes the use of Nepenthes, a low-interaction honeypot, as an additional layer of network defense. Nepenthes can be used to capture malware, alert an administrator about a network compromise, and assist in containing and removing the infection."



11.07.2006

 
Analysis of the Jurisdictional Thresholds for Prosecuting Cyber Crimes in the United States at the State Level



11.06.2006

 
John Kelley - Passive Attribution of wireless target sets during field operations

 
The Virus That Ate DHS

 
Month of Kernel Bugs Day 6 - Microsoft Windows kernel GDI local privilege escalation - Lesson learned: Running GUI components in ring0 is great for performance but terrible for security.



11.05.2006

 
LMH's Kernelfun Blog, after HD Moore's Browserfun blog.

Now with more Apple Airport 802.11 Probe Response Kernel Memory Corruption goodness!



11.04.2006

 
Classic Papers: Secure Deletion of Data from Magnetic and Solid-State Memory (1996) - Can Intelligence Agencies Read Overwritten Data? A response to Gutmann (2003)



11.03.2006

 
The evolution of cybercrime from past to the present

 
Schneier - Bulletproof Textbooks?!? - Perceived Risk vs. Actual Risk

 
FBI nabs suspected identity-theft ring

 
John Davison's Binary Analysis Presentation from Last Night



11.02.2006

 
Datalifter - File Carving Tool

 
Update to arkng's post below: Revision to Windows Vista retail licensing terms

 
Forgent Networks JPEG Related Patent Claims Abandoned

 
Holy EULA Batman: Surprises Inside Microsoft Vista's EULA

 
More on Seagate Drive Encryption from Lance

 
U.S. Fares Poorly in Privacy Study from Privacy International: "Leading surveillance societies in the EU and the World"

 
FCC: Boston airport can't block airline's Wi-Fi



11.01.2006

 
Employee Privacy, Employer Policy "...two recent court cases where an employee's reasonable expectation of privacy was more important than the employer's ability to read any employee's e-mail - despite a privacy policy that clearly stated any company e-mail can, and will, be monitored."

 
As a real life illustration of Gee Whiz's "Foxtrot" post yesterday, here is an article in today's Virginian Pilot about the electronic voting machines to be used in the upcoming election. And I quote -

Elisa Long, Norfolk's general registrar, said every day she reassures people "so concerned about the security of their vote."

Her city has used electronic voting machines since 2002, and she said she isn't worried about somebody introducing a virus to alter the results, as detailed in a Princeton University study, or about hackers compromising her system.

"I feel it's a lot to do about not a lot"

Comment regarding the quote "I feel it's a lot to do about not a lot" from Gee Whiz: Yeah... what's the big deal? It's only about preserving democracy as we know it.

Perhaps the Federalists (Hamiltonians) have defeated those who embrace Jeffersonian democracy? Alexander Hamilton purported demonstrated his preference for monarchy over democracy when he referred to the public as follows: "Your people are a great beast and that the real disease is democracy." (Also "Your people, sir--your people is a great beast!" ) The Federalists were quite elitist in their ways as this Hamilton quote illustrates: "The public must be put in its place so that the responsible men may live free of the trampling and the roar of a bewildered herd."

 
Thursday Evening - Special Guest Lecturer on Malicious Code Analysis - Don't miss it!

 
Secure Programming Traps and Pitfalls - The Broken File Shredder by Wietse Venema

 
The Mass Storage Page - Resources for Developers of USB Devices in the Mass Storage Device Class

USB Device "Wear Leveling" - Poses Interesting Issues for Forensic Analysis

Seagate Introduces Notebook PC Drive with Hardware-Based Full Disc Encryption Security (old)





This page is powered by Blogger.


Site Meter Locations of visitors to this page