Discover Organizations/Events News
Most infrastructure firms feel ready for cyberattacks
Nearly half of those who work in critical infrastructure systems worldwide expect their company to be targeted by a computer attack over the next year, a new survey has found.
Trust No One, Monitor Everyone?
The so-called Zero Trust model for security proposed by Forrester Research earlier this month has revived debate about the way organizations secure their networks.
'Hacktivity 2010' tackles computer security
Caterpillars, roaches and worms crawl on a computer, which represents an infected computer, next to a clean one, in a display that illustrates computer safety at Hacktivity, in Budapest. The major hackers' conference wrapped up in Hungary Sunday after higlighting protection against increasingly sophisticated computer piracy as the Internet becomes ever more present in daily life.
Red Hat tops list of hottest IT security certifications
Interest in IT security certifications is booming, as more U.S. companies tighten up the protection surrounding their critical network infrastructure and as a growing number of employees view security expertise as recession proof.
Scaling the Security Chasm
Many people wear seatbelts because they could get fined if they don't, rather than because wearing them might save their life, security consultant Dr. Anton Chuvakin observed during his keynote speech at the Hack In The Box security convention in Amsterdam in early July. It's an interesting observation, and one that has interesting implications for server security.
Browsers' private modes leak info, say researchers
Browsing in "private mode" isn't as private as users think, a researcher said today. "There are some traces left behind [by all browsers] that could reveal some of the sites that you've been to," said Collin Jackson, an assistant research professor at the Silicon Valley campus of Carnegie Mellon University. Jackson, along with three colleagues from Stanford University, will present their findings later today at the Usenix Security Symposium in Washington, D.C.
Lolpolicy for defining Linux security #LinuxCon
Ever wonder how lolspeak, the language of lolcats could be used to secure Linux? At LinuxCon, Joshua Brindle from Linux security vendor Tresys detailed something he called lolpolicy for making SELinux security policies easier to manage.
Black Hat convention hype hurts the enterprise risk management process
For a few weeks in 1982, I was convinced that space aliens were outside my house. I had irrefutable evidence: strange lights, odd noises, and the like. Of course, the lights were the neighbor's pool, and the noises were the wind. I was just a child, caught up in the hysteria of having just watched the movie Alien on cable a few nights before. I eventually grew up and accepted the reality that aliens were not going to eat me.
Hacker Wonderland: DefCon 18 in Photos
Roughly 10,000 computer hacking enthusiasts, poseurs, geeks, nerds and government agents gathered for DefCon last weekend. In its 18th year, the world
Important Lessons to Learn from the Black Hat ATM Hack
A security researcher named Barnaby Jack amazed attendees at the Black Hat security conference by hacking ATM machines in a session titled "Jackpotting Automated Teller Machines Redux". There are some important lessons to be learned from the hacks Jack demonstrated, and they apply to more than just ATM machines.
Hackers to flock to Black Hat, Defcon this week
Last year, a security researcher was forced to cancel his talk scheduled for two hacker conferences about weaknesses in ATM software after the ATM vendor complained.
Black Hat too commercial for you?
Two premiere security conferences -- Black Hat and DefCon -- run back-to-back in Las Vegas this week, each with their own distinct flavor. But even these events don't meet the needs of all computer security pros, setting the stage for a widening set of satellite events.
Black Hat USA 2010: Complete Coverage
A round-up of articles leading up to and live coverage from Black Hat USA 2010, July 24 to 29, Las Vegas
Defcon social engineering contest stirs concerns
A capture-the-flag-style competition slated to take place at Defcon later this month has raised eyebrows at a number of companies who are concerned they will be embarrassed or negatively impacted in some way. CSO first reported the CTF challenge earlier this month in Defcon contest to spotlight social engineering. The challenge asks contestants to collect information about a "target" company, which they are assigned to by contest coordinators at the web site social-engineer.org.
IE and Safari lets attackers steal user names and addresses
The Internet Explorer, Firefox, Chrome, and Safari browsers are susceptible to attacks that allow webmasters to glean highly sensitive information about the people visiting their sites, including their full names, email addresses, location, and even stored passwords, a security researcher says.
Maiffret returns to eEye Digital Security
Three years ago, Marc Maiffret was tired. He had been running hard as CTO of eEye Digital Security since co-founding the company at age 17. So after a decade, he walked away. He recently resurfaced as chief security architect at FireEye, and did an extensive interview with CSO about how security threats have changed since his eEye days.
Black Hat 2010: New Firefox tool to clean Adobe Flash file errors
A security researcher plans to unveil a new Web browser add-on that cleans Adobe Flash code before a video can be played back, preventing attackers from targeting Adobe Flash file errors.
DefCon contest to spotlight social engineering
This year's Defcon event will feature a contest that asks social engineers to infiltrate target companies. But the challenge is only one part of a large mission to get people thinking about social engineering.