Thursday, August 03, 2006

FBI calls hackers for help / Mac target of Wi-Fi hack / NAC vulnerable

Intel sends out Centrino patches
Intel has released a security patch for its drivers for the Centrino Wi-Fi chipset for Windows to fix a number of serious vulnerabilities. - CNET News.com

Breaking into a laptop via Wi-Fi
Researchers at the Black Hat conference demonstrated how to break into a laptop via Wi-Fi using flaws in its drivers. - CNET News.com

FBI calls for hacker help
FBI asked hackers for help in the bureau's fight against cybercrime at the Black Hat conference. - CNET News.com

FBI seeks hacking partners
FBI wants hackers to give the bureau their input on the best ways to fight cybercrime. - Computer Weekly

Security conference targets the Mac in Wi-Fi demo
Researchers used an Apple MacBook as their target to demonstrate how vulnerabilities in Wi-Fi device drivers can give access to a system. - Computer Weekly

Black Hat: Hit spyware by punishing purveyors, experts say
Antispyware experts say that fighting spyware is best done by punishing the purveyors harder. - Computerworld

Black Hat: Blog readers vulnerable to embedded malware

Atom or RSS feeds can be used by malware writers to install trojans on unsuspecting feed users' PCs. - Computerworld

Black Hat: NAC solutions vulnerable to attack
Systems for network access control contain vulnerabilities that make them vulnerable to attack, researchers warn. - Computerworld

'Brute force' attacks against SMBs on the rise
Small and medium sized businesses have over the last few months become increasingly under attack from targeted brute force attempts. - Computerworld

Intel issues patches for wireless vulnerabilities

Intel has issued a security patch to fix a serious security vulnerability in the Windows drivers for its Centrino Wi-Fi chipset. - Computerworld

ActiveX fuzzer runs IE through security mill
HD Moore has released a fuzzer that can help finding weaknesses in Internet Explorer's handling of ActiveX objects. - eWEEK

Experts point to weakness in NAC security
Experts at the Black Hat conference warn against weaknesses of network access control systems. - eWEEK

The dilemma of reporting spyware attacks

Companies may be afraid to report spyware incidents to authorities, because they could face criminal charges themselves for not securing data. - eWEEK

Hackers expose 'critical' Wi-Fi driver flaw
Both Mac and Windows PCs can become target of attacks that uses flaws in the drivers for the Wi-Fi network devices. - eWEEK

Intel offers security fixes for Centrino
Intel has released updated drivers for its Centrino Wi-Fi chipsets to fix a number of critical security vulnerabilities. - eWEEK

FBI: Hackers must help fight Web mob

The FBI pleaded the hacker community for assistance in its fight against cybercrime by sharing information. - eWEEK

Hackers show MacBook vulnerability
Hackers at the Black Hat conference demonstrated flaws of Wi-Fi drivers by hacking into an Apple MacBook. - Federal Computer Week

Feds wants help from private sector on IT security
FBI is getting into a deeper fight against cybercrime, but needs help from the private security experts. - Government Computer News

The future of authentication
The latest trends in authentication can be found in the health-care and financial services industries. - Government Computer News

Feds look to arrest ID theft with new industry alliance
New threats mean that the FBI has to rely more on private sector researcher on the forefront of the current trends. - InformationWeek

Standards issues open network security holes
Lack of standards in network access control systems has left them open to vulnerabilities, experts at Black Hat warns. - InformationWeek

Open-source Metasploit improves evasion
Metasploit-creator HD wants to scare creators of intrusion detection systems with the evasion features of the latest version of the software. - Internetnews.com

Phishers hit the phone bank with Asterisk
Using open-source Asterisk, phishers can create fake bank phone systems to fool users. - Internetnews.com

Dodging NAC's silver bullet
Network access control may not be the magic elixir for security as some vendors hope, due to inherent security problems. - Internetnews.com

Vista security mostly invisible but thorough
Microsoft wants to show that it is taking security serious in Windows Vista by its major presence at the Black Hat conference. - Internetnews.com

Mac users facing new security threats
Mac users will face new security threats as malware writers and hackers target applications rather than operating systems. - NewsFactor

Another look at VoIP security risks
Experts warn that VoIP applications are just as vulnerable to attacks as any other Internet application. - NewsFactor

Webroot CTO: Spyware threats on the increase

Spyware is becoming a bigger problem with a large number of new threats and methods. - SC Magazine UK/US

Mobile storage devices a threat to businesses
Study shows that many owners of Memory Sticks use them to transfer files between PCs and not just for MP3-players or cameras. - SC Magazine UK/US

Microsoft and Apple 'must improve security patches'
Security patches from vendors like Microsoft and Apple should also include security fixes for drivers, experts urges. - Silicon.com

Laptop thefts pose real gov't data risk
British government agencies have had an alarming number of laptops stolen, putting data at risk. - Silicon.com

Precision phishing on the rise
Very small banks and credit unions are new favorites on the menues of phishers, the Anti-Phishing Working Group reports. - Sydney Morning Herald

EBay scamming automation primed for fraud

Fraudsters use automatic bots to improve their reputations on eBay to gain users' trust. - The Register

Symantec highlights Windows Vista user vulnerabilities
Symantec tries to shed more light on which parts of the Windows Vista security model it finds flawed. - The Register

Two factor risks highlighted
A recent attack on the online payment system E-gold highlights how two factor security can be beaten. - Vnunet.com

Hackers clone e-passports
A German security expert has demonstrated how e-passports with RFID chips can be cloned. - Wired News

1 Comments:

At 12:16 PM, Blogger Jesper Stein Sandal said...

This week's Black Hat highlights a problem with dupes that I have run into. I will try to rethink how I deal with multiple almost identical stories for tomorrow to try to make the unique stories stand out more.

I will probably pick the first news story about a topic (like today's Intel update), give it the usual two line summary, and then list all the other stories that are similar, but has new information or details under the first story, but only with headline and media showing.

I hope that the less work with writing different summaries for the dupes will make up for the extra editing.

 

Post a Comment

<< Home