The Cybersecurity and Infrastructure Security Agency (CISA) recently conducted an in-depth Red Team Assessment (RTA) to enhance cybersecurity in US critical infrastructure sectors. One critical infrastructure organization requested this ass...
Several implementations of the Lightweight Directory Access Protocol (LDAP) protocol contain vulnerabilities that may allow denial-of-service attacks, unauthorized privileged access, or both. If your site uses any of the products listed in this advisory, the CERT/CC encourages you to follow the . . .
Is hacking starting to lose its culture? Though black clothing still dominated and clusters of hackers exchanging information was still the norm, the crowd at this year's Def Con was older and appeared to be far more professional. "It is more laid back this year," acknowledged Jeff Moss, the founder of the conference, now in its ninth year.. . .
Hackers, computer security managers and law enforcement officials teamed up at this week's Black Hat Briefings conference to discuss their respective roles in securing the Internet and to urge attendees who engage in hacking activities to stay on the right side . . .
For nine years, Defcon has been known as the world's most exuberant party for hackers and hacker hopefuls who gather in sin city for a rollicking good time. Conference organizers call it the "annual computer underground party for hackers," and Defcon . . .
Las Vegas plays host to two separate security conferences this week--one for people who guard computer systems, another for those who break into them. System administrators and hackers, CIOs and script kiddies will all gather in the desert to trade information, . . .
Hacker conventions, such as those being held in Las Vegas this week, are no longer considered the sinister gatherings they once were. If the slot machines get a little screwy this week, casino detectives will have plenty of suspects. Thousands of computer hackers and security experts begin converging in Las Vegas Tuesday for the annual Black Hat Briefings and Def Con convention on computer security.. . .
Despite high profile security breaches the issue is still not a priority for many, a survey finds Half of IT directors are willing to bet less than £1 that their IT systems are safe from hacker attack, according to a . . .
The Center for Internet Security (CIS), a coalition of internet user groups, yesterday released the first set of minimum security standards for operating systems. Starting off with specs for Solaris, the user group plans to introduce similar standards for Windows, as . . .
The Black Hat Briefings is a conference for researchers, IT professionals and experienced security administrators. Every year, leaders in the security field are brought together to Black Hat to discuss the latest threats, trends, products, and influences in the Internet and . . .
The organization charged with managing the worldwide Domain Name System (DNS) has launched a study to gauge privacy concerns raised by the plethora of personal information contained in the "Whois" database, a publicly searchable resource used to determine the identity of . . .
Maintaining the openness of OpenBSD got a little more complicated recently when the project leader of what may be one of the most popular modules in OpenBSD decided to re-word his home-grown license to specifically disallow modifications to the source code . . .
An organisation formed to promote compatibility between different implementations of OpenPGP standard does not include Network Associates, which is the main supplier of PGP-based encryption products for business. The OpenPGP Alliance, which was founded by PGP creator Phil Zimmermann, doesn't include . . .
The Attrition staff outlines their decision to no longer maintain the Web defacement archive. "During this time, we have struggled to keep up various other sections of Attrition that have been a core part of the site. As the mirror grew and began to consume more resources, the other sections have found themselves on the backburner and rarely updated. In essence, what was once a hobby site run in spare time for fun has turned into a beleaguring second job. A job that comes with more headache, complaints, criticisms, slander and attacks than productive output or reward. . . .
The problem with IT security benchmarks is that the reference point is a constantly shifting target as new technologies and threats emerge. And that's an especially difficult problem to overcome, said corporate security systems managers. They are examining the fruits of . . .
With security expertise becoming an increasingly expensive but important commodity, security companies plan to focus on managed security services as a key selling point at the RSA Conference 2001 this week in San Francisco. In addition, companies are pushing systems to . . .
The RSA Conference, named for the Bedford, Mass.-based security company that puts it together, began Sunday and runs through Thursday. In another sign that security has become important business, the sponsors include Intel, Microsoft, Hewlett-Packard, IBM and Compaq. "I think the . . .
Does an alphabet soup of acronyms, which stand for certifications that you've obtained, follow your signature? Are you wondering which, if any, are really valuable? Are you contemplating a worthwhile certification challenge? Have you been working in the information system security . . .
On the surface, IT-ISAC sounds wonderful, but there's something wrong with this picture. Each of these companies might provide a general idea as to the kinds of attacks that it is receiving. But no company in its right mind will contribute . . .
The Electronic Privacy Information Center (EPIC) has teamed up with Privacy International in relaunching a Web site that aims to become the clearinghouse for all privacy-related news worldwide. The new site, EPIC – Electronic Privacy Information Center, hosts links to hundreds of news . . .