Security News AlertNetwork World's Security News Alert, 08/03/07Q&A: Meet the Borat of hackers, 08/02/07: Ever hear of the nation of Hackistan? I hadn’t until I met the president of Hackistan, who happened to be manning a booth at the Black Hat conference here Wednesday. He showed me on a map how Hackistan borders North Sloberia, East Sloberia and the Alpha Zone. The prez was kind enough to grant an interview to explain the important international role his country now plays in identity theft, hacking networks and phishing. Podcast face-off: A heated duel over security research: Should security companies pay for vulnerability research? Yes, TippingPoint's Terri Forslof; No says Dave Marcus. Questions swirl around virtual-machine rootkit detection, 08/02/07: Can rootkit malware that hides by mimicking a software-based virtual machine ever be detected? That was the topic of debate as security researchers presented their latest findings to packed audiences at the Black Hat Conference.
Researchers flag VoIP exploits at Black Hat, 08/02/07: Security consultancy iSec Partners yesterday detailed half a dozen ways to compromise VoIP-based phone systems based on the H.323 and Inter Asterisk eXchange protocols. Microsoft seeks Black Hat tips on virtualization security, 08/02/07: Microsoft Wednesday for the first time laid out the underpinnings of the security capabilities it has built into its forthcoming Windows Server Virtualization technology, in hopes that researchers will help vet the software, which is expected to ship next year. Diebold voting machines vulnerable to virus attack, 08/03/07: Diebold Election Systems voting machines are not secure enough to guarantee a trustworthy election, and an attacker with access to a single machine could disrupt or change the outcome of an election using viruses, according to a review of Diebold's source code. Security expert takes aim at leaky C software programs, 08/02/07: A University of Illinois at Chicago researcher is working on a tool to help C programmers build applications that are much less likely to reveal personal data. He recently received a $250,000 National Science Foundation grant. Web browser attack skirts corporate, 08/01/07: A 10-year-old security problem has come back to haunt corporate IT, a security researcher told an audience at the Black Hat conference in Las Vegas Wednesday. D'oh! Homer photo exposes Chinese media piracy, 08/02/07: A photo of Homer Simpson accompanying an article about multiple sclerosis (MS) has exposed Chinese state-run media's penchant for using images without permission. European project looks to manage online threats, 08/01/07: Researchers are looking for formal European Union sponsorship of a new project that would keep an eye on malicious software and computer attacks around the world. MPack crimeware hits 500,000 victims, 08/01/07: Poor detection of the MPack data-theft toolkit by anti-virus software has allowed it to run riot on the Internet, a new analysis from Finjan has claimed. Review: How we tested NAC appliances, 07/30/07: Here's what was included in our all-in-one NAC product test bed. |
Contact the author: Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment