High-tech

High-tech
Light

Saturday, August 9, 2014

The big Black Hat security roundup

---------- Forwarded message ----------
From: "Network World Special Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Aug 8, 2014 10:02 AM
Subject: The big Black Hat security roundup
To: <aquarianm@gmail.com>
Cc:

Black Hat keynote: U.S. should buy up zero day attacks for 10 times going rate | Black Hat USA 2014: Talking botnets and ad campaigns

Network World Special Alert

Forward this to a Friend >>>


10 ways to get noticed at Black Hat
Hint: If blue wigs and aluminum-foil hats don't work, try free beer Read More



Black Hat keynote: U.S. should buy up zero day attacks for 10 times going rate
Las Vegas -- The U.S. government should pay 10 times the going rate for zero-day software flaws in order to corner the market and then make those vulnerabilities public to render them less potent for attackers, Black hat 2014 attendees were told yesterday. Dan Geer That would reduce the overall threats against Internet traffic in general and cost less than the damage that actual exploits cause, says Dan Geer, who is the chief information security officer at In-Q-Tel, the venture capital arm of the Central Intelligence Agency.To read this article in full or to leave a comment, please click here Read More

Black Hat USA 2014: Talking botnets and ad campaigns
"The situation we're in with advertising is a lot like where the banks are, where everyone has struggled with the fact that you can't trust the other end of the connection," says White Ops CEO Michael Tiffany. "It's the same cookies, user information, etc. But one is real, and the other is fake."[Malicious advertising offers broad reach and quick rewards for malware perpetrators]Tiffany, of course, is referring to the very real threat of botnets targeting ad campaigns by infecting the computers of actual customers and users. When it comes to dodging anomaly detection, this is a far more effective approach than attempting to steal credentials.To read this article in full or to leave a comment, please click here Read More

Black Hat 2014: The challenge of securing embedded devices and IoT on display
LAS VEGAS - Every year the numbers and the types of devices security professionals find themselves having to secure from attacks keep growing, and there's certainly no sign of that letting up at Black Hat 2014 this year.This week at the annual Las Vegas event, researchers Charlie Miller and Christopher Valasek in their talk A survey of remote automotive attack surfaces, will show how attackers – often remotely - can leverage vulnerabilities to hack vehicles, and in some cases quite seriously. While Logan Lamb will present how home security systems are susceptible to shenanigans in his presentation, Home Insecurity: No Alarms, False Alarms and SigInt.To read this article in full or to leave a comment, please click here Read More

Network-attached storage devices more vulnerable than routers, researcher finds
A security review found serious vulnerabilities in 10 popular NAS systems Read More

Most USB thumb drives can be reprogrammed to silently infect computers
The firmware in such devices is unprotected and can be easily overwritten by malware, researchers from Security Research Labs said Read More

Black Hat 2014: How to crack just about everything
From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology Read More

The Black Hat Quiz 2014
How well do you know the security conference's revelations about NSA, pwned cars, spying cell phones and more? Read More

10 disturbing attacks at Black Hat USA 2014
Attacking car systems, Google Glass for password theft, using free cloud trials to launch botnets, more Read More


SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Rackspace bows out of IaaS market

2. Why TCP/IP is on the way out

3. 2014's Starting Salaries for College Tech Majors

4. Wikipedia link censorship shows Bonnie & Clyde might have had 'right to be forgotten'

5. Microsoft's inconsistent Windows Phone 8.1 strategy stumbles forward

6. Top 20 colleges for computer science majors, based on earning potential

7. 10 disturbing attacks at Black Hat USA 2014

8. IE plays security catch-up, will block outdated Java plug-ins

9. Network-attached storage devices more vulnerable than routers, researcher finds

10. How to Survive 4 Cloud Horror Stories


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment