High-tech

High-tech
Light

Tuesday, August 5, 2014

Black Hat 2014: How to steal security codes from home alarm systems

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Aug 4, 2014 9:01 PM
Subject: Black Hat 2014: How to steal security codes from home alarm systems
To: <aquarianm@gmail.com>
Cc:

  Processor delays hurt ARM server adoption, Dell exec says | Cisco patches traffic snooping flaw in operating systems used by its networking gear

 
  Network World After Dark

Forward this to a Friend >>>


Black Hat 2014: How to steal security codes from home alarm systems
For $50 attackers can build a radio device that cracks home alarm systems and other common security devices, Black Hat 2014 attendees will hear this week. A combination of a microcontroller and a single-board computer comprises the device, which can capture and replay codes that make it possible to disable the alarms, according to Silvio Cesare, a researcher at Qualys who will present the talk. + Also on Network World: 10 disturbing attacks at Black Hat USA 2014 |The Black Hat Quiz 2014 +To read this article in full or to leave a comment, please click here Read More
 


WEBCAST: Cisco Systems

Evaluating Leading Breach Detection Systems
Today's constantly evolving advanced malware and Advanced Persistent Threats (APTs) can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to confront these advanced threats before, during and after attacks. Learn more >>

WEBCAST: Box

Top Mobile Management Questions Answered
How can IT provide seamless and secure mobile communications and collaboration for all? Take a look at this on-demand Webcast where IDG asks an expert panel pressing questions surrounding mobile security and management. Prepare to have with your mobility questions answered! Learn more

Processor delays hurt ARM server adoption, Dell exec says
The low-power advantage in ARM server chips is diminishing, says Dell's server chief Read More
 

Cisco patches traffic snooping flaw in operating systems used by its networking gear
  The vulnerability affects the OSPF routing protocol implementation on Cisco networking equipment Read More
 

Microsoft continues global CRM expansion in battle against Salesforce.com
Microsoft has expanded the availability of its cloud CRM software into 17 additional countries in a move sure to step up its rivalry with Salesforce.com.The move brings Dynamics CRM Online to new places in South America, the Caribbean, Asia, the Middle East, Africa and Europe."Together with Microsoft Azure and Office 365, CRM Online is a critical part of the Microsoft Cloud for Business," said Bob Stutz, corporate vice president of Dynamics CRM, in a blog post. on Monday. "We want to do everything we can to bring these cloud benefits to as many businesses and countries as possible."To read this article in full or to leave a comment, please click here Read More
 

Windows Phone 8.1 Update hands-on: An insignificant upgrade
Microsoft's Windows Phone 8.1 Update 1 (we'll call it 'the Update') is rolling out now, but don't get too excited.The infrequency of these releases makes any new one seem important. This was justified with Windows Phone 8.1. Not so with this update (er, Update), which I tried on the Lumia 1520 phablet (it wasn't available yet for our Nokia Icon test phone). It adds a nice feature or two, but nothing earth-shattering. Mark Hachman Opened folders appear as a small icon at top, with contents grouped below. When compressed, the icons shrink down and live in the folder.To read this article in full or to leave a comment, please click here Read More
 

Hewlett-Packard slams ex-Autonomy exec, says it will sue
Hewlett-Packard has fired back at a former Autonomy executive who is attempting to block the settlement of a number of shareholder lawsuits filed over HP's disastrous acquisition of the infrastructure software vendor.HP bought Autonomy in 2011 for more than US$10 billion, but later wrote off $8.8 billion of the purchase price after discovering what it called serious accounting irregularities on the part of Autonomy prior to the deal.Ex-Autonomy Chief Financial Officer Sushovan Hussain filed a motion in June over the shareholder cases, arguing that a settlement would prevent the truth from being revealed, namely HP's "own destruction of Autonomy's success after the acquisition."To read this article in full or to leave a comment, please click here Read More
 

How NOT to handle negative online reviews
The "Streisand Effect" is in full force after the New York Post reported the Union Street Guest House hotel "charges couples who book weddings at the venue $500 for every bad review posted online by their guests." Before it hit the fan and the Internet responded with a flurry of bad PR, the hotel's website stated the following policy for online reviews: If you have booked the Inn for a wedding or other type of event anywhere in the region and given us a deposit of any kind for guests to stay at USGH there will be a $500 fine that will be deducted from your deposit for every negative review of USGH placed on any internet site by anyone in your party and/or attending your wedding or event. If you stay here to attend a wedding anywhere in the area and leave us a negative review on any internet site you agree to a $500 fine for each negative review. (Please NOTE we will not charge this fee &/or will refund this fee once the review is taken down). Talk about backfiring. Union Street Guest House now has a one-star rating on Yelp. For today alone, August 4, the hotel has thus far received over 500 one-star ratings, spread out over 15 pages…and it may well exceed that, but that's when I stopped counting.To read this article in full or to leave a comment, please click here Read More
 

TechTip: Using 'track changes' to avoid proofreading confusion
  TechTip: Using 'track changes' to avoid proofreading confusion If you've had friends proofread a paper or resume then you know how confusing their changes can get. Using some very easy functions in Microsoft Word and Google Docs I'll show you how to clear... From: Network World Views: 0 0 ratings Time: 01:20 More in Science & Technology Read More
 

Coolest wearable technology: Robot suits for physical labor
Last year, Daewoo Shipbuilding and Engineering tested robotic suits that give workers superhuman strength to handle heavy objects at its facility in Okpo-dong, South Korea, according to a recent report in the New Scientist. Read More
 

iPhone 6 rumor rollup for the week ending Aug. 1
The hunt for iOctober, Glowing Logo, real virtual health, sapphire woe. Read More
 

New products of the week 08.04.2014
  Our roundup of intriguing new products from companies such as EMC and RSA. Read More
 

 

SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Why TCP/IP is on the way out

2. Most 'hackable' vehicles are Jeep, Escalade, Infiniti and Prius

3. 20 cool things you can do with a Raspberry Pi

4. Cisco revamps CCNP for IoT, other market transitions

5. How cellphone calling is going all Internet

6. 10 disturbing attacks at Black Hat USA 2014

7. Top 20 colleges for computer science majors, based on earning potential

8. 5 Big Data projects that could change your life

9. The best cities for landing top pay for your tech skills

10. Black Hat 2014: How to crack just about everything


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment