Friday, August 03, 2007

Meet the Borat of hackers; A heated duel over security research

Network World

Security News Alert




Network World's Security News Alert, 08/03/07

Q&A: Meet the Borat of hackers, 08/02/07: Ever hear of the nation of Hackistan? I hadn’t until I met the president of Hackistan, who happened to be manning a booth at the Black Hat conference here Wednesday. He showed me on a map how Hackistan borders North Sloberia, East Sloberia and the Alpha Zone. The prez was kind enough to grant an interview to explain the important international role his country now plays in identity theft, hacking networks and phishing.

Podcast face-off: A heated duel over security research: Should security companies pay for vulnerability research? Yes, TippingPoint's Terri Forslof; No says Dave Marcus.

Questions swirl around virtual-machine rootkit detection, 08/02/07: Can rootkit malware that hides by mimicking a software-based virtual machine ever be detected? That was the topic of debate as security researchers presented their latest findings to packed audiences at the Black Hat Conference.

Network World Buyer's Guides

Find the right products for your enterprise - fast. With seven categories - security, storage, convergence and VoIP, network infrastructure, network applications, wireless and LAN/WAN management - you can quickly pinpoint the hardware or software you need. With the side-by-side comparison tool you can evaluate product features and make the best purchase decisions for your enterprise.

Click here to go to the Buyer's Guides now.

Researchers flag VoIP exploits at Black Hat, 08/02/07: Security consultancy iSec Partners yesterday detailed half a dozen ways to compromise VoIP-based phone systems based on the H.323 and Inter Asterisk eXchange protocols.

Microsoft seeks Black Hat tips on virtualization security, 08/02/07: Microsoft Wednesday for the first time laid out the underpinnings of the security capabilities it has built into its forthcoming Windows Server Virtualization technology, in hopes that researchers will help vet the software, which is expected to ship next year.

Diebold voting machines vulnerable to virus attack, 08/03/07: Diebold Election Systems voting machines are not secure enough to guarantee a trustworthy election, and an attacker with access to a single machine could disrupt or change the outcome of an election using viruses, according to a review of Diebold's source code.

Security expert takes aim at leaky C software programs, 08/02/07: A University of Illinois at Chicago researcher is working on a tool to help C programmers build applications that are much less likely to reveal personal data. He recently received a $250,000 National Science Foundation grant.

Web browser attack skirts corporate, 08/01/07: A 10-year-old security problem has come back to haunt corporate IT, a security researcher told an audience at the Black Hat conference in Las Vegas Wednesday.

D'oh! Homer photo exposes Chinese media piracy, 08/02/07: A photo of Homer Simpson accompanying an article about multiple sclerosis (MS) has exposed Chinese state-run media's penchant for using images without permission.

European project looks to manage online threats, 08/01/07: Researchers are looking for formal European Union sponsorship of a new project that would keep an eye on malicious software and computer attacks around the world.

MPack crimeware hits 500,000 victims, 08/01/07: Poor detection of the MPack data-theft toolkit by anti-virus software has allowed it to run riot on the Internet, a new analysis from Finjan has claimed.

Review: How we tested NAC appliances, 07/30/07: Here's what was included in our all-in-one NAC product test bed.

TODAY'S MOST-READ STORIES:

1. IBM saves $250M with Linux-run mainframes
2. Nortel lands huge $300M VoIP win
3. Cisco muffles Linksys death knell
4. NAC alternatives hit the mark
5. Grid pays handsome dividends for HR firm
6. AT&T, IBM among winners of $50B federal deal
7. Online gamers' dirty little secrets exposed
8. IBM supercomputer more powerful than before
9. Hogwarts IT director quits
10. Apple iPhone battery complaints mounting

MOST-READ REVIEW:
NAC alternatives hit the mark


Contact the author:

Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments:

Post a Comment