FBI calls hackers for help / Mac target of Wi-Fi hack / NAC vulnerable
Intel sends out Centrino patchesIntel has released a security patch for its drivers for the Centrino Wi-Fi chipset for Windows to fix a number of serious vulnerabilities. - CNET News.com
Breaking into a laptop via Wi-Fi
Researchers at the Black Hat conference demonstrated how to break into a laptop via Wi-Fi using flaws in its drivers. - CNET News.com
FBI calls for hacker help
FBI asked hackers for help in the bureau's fight against cybercrime at the Black Hat conference. - CNET News.com
FBI seeks hacking partners
FBI wants hackers to give the bureau their input on the best ways to fight cybercrime. - Computer Weekly
Security conference targets the Mac in Wi-Fi demo
Researchers used an Apple MacBook as their target to demonstrate how vulnerabilities in Wi-Fi device drivers can give access to a system. - Computer Weekly
Black Hat: Hit spyware by punishing purveyors, experts say
Antispyware experts say that fighting spyware is best done by punishing the purveyors harder. - Computerworld
Black Hat: Blog readers vulnerable to embedded malware
Atom or RSS feeds can be used by malware writers to install trojans on unsuspecting feed users' PCs. - Computerworld
Black Hat: NAC solutions vulnerable to attack
Systems for network access control contain vulnerabilities that make them vulnerable to attack, researchers warn. - Computerworld
'Brute force' attacks against SMBs on the rise
Small and medium sized businesses have over the last few months become increasingly under attack from targeted brute force attempts. - Computerworld
Intel issues patches for wireless vulnerabilities
Intel has issued a security patch to fix a serious security vulnerability in the Windows drivers for its Centrino Wi-Fi chipset. - Computerworld
ActiveX fuzzer runs IE through security mill
HD Moore has released a fuzzer that can help finding weaknesses in Internet Explorer's handling of ActiveX objects. - eWEEK
Experts point to weakness in NAC security
Experts at the Black Hat conference warn against weaknesses of network access control systems. - eWEEK
The dilemma of reporting spyware attacks
Companies may be afraid to report spyware incidents to authorities, because they could face criminal charges themselves for not securing data. - eWEEK
Hackers expose 'critical' Wi-Fi driver flaw
Both Mac and Windows PCs can become target of attacks that uses flaws in the drivers for the Wi-Fi network devices. - eWEEK
Intel offers security fixes for Centrino
Intel has released updated drivers for its Centrino Wi-Fi chipsets to fix a number of critical security vulnerabilities. - eWEEK
FBI: Hackers must help fight Web mob
The FBI pleaded the hacker community for assistance in its fight against cybercrime by sharing information. - eWEEK
Hackers show MacBook vulnerability
Hackers at the Black Hat conference demonstrated flaws of Wi-Fi drivers by hacking into an Apple MacBook. - Federal Computer Week
Feds wants help from private sector on IT security
FBI is getting into a deeper fight against cybercrime, but needs help from the private security experts. - Government Computer News
The future of authentication
The latest trends in authentication can be found in the health-care and financial services industries. - Government Computer News
Feds look to arrest ID theft with new industry alliance
New threats mean that the FBI has to rely more on private sector researcher on the forefront of the current trends. - InformationWeek
Standards issues open network security holes
Lack of standards in network access control systems has left them open to vulnerabilities, experts at Black Hat warns. - InformationWeek
Open-source Metasploit improves evasion
Metasploit-creator HD wants to scare creators of intrusion detection systems with the evasion features of the latest version of the software. - Internetnews.com
Phishers hit the phone bank with Asterisk
Using open-source Asterisk, phishers can create fake bank phone systems to fool users. - Internetnews.com
Dodging NAC's silver bullet
Network access control may not be the magic elixir for security as some vendors hope, due to inherent security problems. - Internetnews.com
Vista security mostly invisible but thorough
Microsoft wants to show that it is taking security serious in Windows Vista by its major presence at the Black Hat conference. - Internetnews.com
Mac users facing new security threats
Mac users will face new security threats as malware writers and hackers target applications rather than operating systems. - NewsFactor
Another look at VoIP security risks
Experts warn that VoIP applications are just as vulnerable to attacks as any other Internet application. - NewsFactor
Webroot CTO: Spyware threats on the increase
Spyware is becoming a bigger problem with a large number of new threats and methods. - SC Magazine UK/US
Mobile storage devices a threat to businesses
Study shows that many owners of Memory Sticks use them to transfer files between PCs and not just for MP3-players or cameras. - SC Magazine UK/US
Microsoft and Apple 'must improve security patches'
Security patches from vendors like Microsoft and Apple should also include security fixes for drivers, experts urges. - Silicon.com
Laptop thefts pose real gov't data risk
British government agencies have had an alarming number of laptops stolen, putting data at risk. - Silicon.com
Precision phishing on the rise
Very small banks and credit unions are new favorites on the menues of phishers, the Anti-Phishing Working Group reports. - Sydney Morning Herald
EBay scamming automation primed for fraud
Fraudsters use automatic bots to improve their reputations on eBay to gain users' trust. - The Register
Symantec highlights Windows Vista user vulnerabilities
Symantec tries to shed more light on which parts of the Windows Vista security model it finds flawed. - The Register
Two factor risks highlighted
A recent attack on the online payment system E-gold highlights how two factor security can be beaten. - Vnunet.com
Hackers clone e-passports
A German security expert has demonstrated how e-passports with RFID chips can be cloned. - Wired News
1 Comments:
This week's Black Hat highlights a problem with dupes that I have run into. I will try to rethink how I deal with multiple almost identical stories for tomorrow to try to make the unique stories stand out more.
I will probably pick the first news story about a topic (like today's Intel update), give it the usual two line summary, and then list all the other stories that are similar, but has new information or details under the first story, but only with headline and media showing.
I hope that the less work with writing different summaries for the dupes will make up for the extra editing.
Post a Comment
<< Home