The Cybersecurity and Infrastructure Security Agency (CISA) recently conducted an in-depth Red Team Assessment (RTA) to enhance cybersecurity in US critical infrastructure sectors. One critical infrastructure organization requested this ass...
The Swedish anti-copyright group Piratbyran, which gave rise to the popular file-sharing website The Pirate Bay has disbanded.
Marcin de Kaminski, a founder of Piratbyran, which means "piracy bureau" in English, told BBC News "we don't feel we are needed" any more.
A federal judge has handed a major victory to anti-spam crusaders Spamhaus, slashing an $11.7m verdict to just $27,002.
US Judge Charles P. Kocoras of the Eastern District of Illinois said the plaintiffs, e360 Insight and its founder David Linhardt, failed to credibly calculate the damage that resulted when its promotional emails were targeted by Spamhaus.
I go to a lot of security conferences, almost always without my family in tow. The logistics and money involved with trekking them from one part of the country to the next is usually beyond my resources. But when a conference is local and there's something in it for the kids, I'm in 100 percent.
Sourcefire, the creators of Snort(R) and a leader in intelligent Cybersecurity solutions, today announced that its founder and CTO, Martin Roesch, will speak at the FS-ISAC 2010 Spring Conference. During the session, Roesch will discuss the techniques and solutions financial institutions need to implement to protect their data from today's evolving threat landscape.
Trends including the increase in web data and the number of people accessing the internet will have implications for information security in the future, says a report by PricewaterhouseCoopers (PwC), commissioned by government body the Technology Strategy Board.
Each spring, the MIS Training Institute hosts InfoSec World, an educational event that brings information security practitioners together to learn from each other. This year, volcanic fallout prevented a few participants from making the trek. But those who attended were treated to detail-rich sessions about today's biggest security threats.
Companies crave experience in their security staffers, dimming prospects for entry-level applicants. Bill Brenner on how a young upstart can break through. If you're young, breaking into the security industry can be hell.
Late last month, another kind of games was held in Vancouver: the Pwn2Own contest, where computer-security researchers were invited to hack computers using unknown, or
Owners of Apple products have a tendency to be complacent about security, but the results of this year's Pwn2Own contest suggest a little more wariness may be in order. "It's the fourth year they've run the contest, and every year someone's broken into Safari," noted Charlie Miller, the security analyst who won $10,000 and a MacBook Pro for hacking the browser in this year's event.
Hackers took down Apple 's iPhone and Safari browser, Microsoft 's Internet Explore 8 (IE8) and Mozilla's Firefox within minutes at today's Pwn2Own contest, as expected.
The two-man team of Vincenzo Iozzo and Ralf-Philipp Weinmann exploited the iPhone in under five minutes, said a spokeswoman for 3Com TippingPoint, the security company that sponsored the contest. The pair also walked away with $15,000 in cash, a record prize for the challenge, which is in its fourth year.
Privacy is not dead in the era of online social networking. It just needs careful curation.
That was the message Saturday from Danah Boyd, a social-media expert who works for Microsoft Research and who was Saturday's keynote speaker at the South by Southwest Interactive (SXSWi) festival here.
Speaking at the RSA Conference in San Francisco on Wednesday, Secretary of the Department of Homeland Security (DHS) Janet Napolitano announced the National Cybersecurity Awareness Campaign Challenge Competition, a contest to solicit ideas from individuals and industry about how to best engage the American public in a discussion about cybersecurity.
Pwn2Own is a famous contest held in CansecWest Conference. Every year there is a big reward for researchers who finds exploitable bugs in popular browser and OS and also in mobile devices like iPhone. For the past two years the Pwn2Own contest champion was Charlie Miller (0xcharlie on Twitter), one of the most famous bug hunter and security expert in the world.
As RSA Conference 2010 opens this week in San Francisco, vendors are using this major security show to launch products ranging from hardware to software to virtual appliances in an effort to address specific network security needs. Here are some of those offerings.
The Cloud Security Alliance and Hewlett-Packard will release research today at RSA Conference that identifies the top threats to cloud computing. The document is a companion to the CSA's "Security Guidance for Critical Areas in Cloud Computing," which was updated in December.
The first time I attended the RSA Conference in 2005, I was overwhelmed.
The show floor is massive and once you go in it can be hard to find the right door out. Vendor salespeople swamp you. The Tuesday-morning keynotes can be an assault on the eyes, with speakers standing in front of massive uber-resolution screens.
The Internet Research Task Force's (IRTF) Anti-Spam Research Group (ASRG) has produced a summary of how DNS blacklists and whitelists (DNSBLs and DNSWLs, designated in the RFC as DNSxLs) should be used and of the security issues which need to be considered when doing so. The summary is in the form of a 'Request for Comments' (RFC 5782).
A hacking contest next month will award cash prizes of $15,000 to anyone who can break into an iPhone, BlackBerry Bold, Droid or Nokia smartphone. The prizes are 50% more than the top awards given last year at Pwn2Own, which will kick off March 24 at the CanSecWest security conference in Vancouver, British Columbia. Altogether, $100,000 could be handed out by 3Com TippingPoint, the contest sponsor.
Open Source Days is the largest open source conference in the Nordic area. It's your opportunity to meet, share, and learn from professional open source experts.