Legal wiretap mechanisms may be open to abuse within ISPs

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

Legal wiretap mechanisms may be open to abuse within ISPs


Legal wiretap mechanisms may be open to abuse within ISPs

Posted: 30 Jul 2010 09:00 AM PDT


The built-in mechanism that lets many Internet providers tap communications for law enforcement agencies is susceptible to abuse by insiders who work for the ISPs, Black Hat 2010 was told.

Ironkey looks to secure mobile, business banking

Posted: 30 Jul 2010 09:00 AM PDT


Cybercriminals are increasingly looking at business rather than consumer accounts to hack as banks scramble to shore up their defenses, according to an executive from vendor IronKey.

AirTight defends Wi-Fi WPA2 'vulnerability' claim

Posted: 30 Jul 2010 09:00 AM PDT


AirTight is defending its claim to have uncovered a vulnerability in the 802.11 specification, and to have mounted an undetectable insider attack based on it. Some have dismissed it as a "publicity stunt."

FBI rings organizers over Defcon contest

Posted: 30 Jul 2010 09:00 AM PDT


A Defcon contest that invites contestants to trick employees at U.S. corporations into revealing not-so-sensitive data has rattled some nerves.

Facebook, nannying, and objectives

Posted: 30 Jul 2010 09:00 AM PDT


Gibbs ponders the problems with employees and social networking and suggests that nannying won't cut it.

Black Hat gets its video feed hacked

Posted: 30 Jul 2010 09:00 AM PDT


A security expert found a way to catch the talks at Black Hat for free, thanks to bugs in the video streaming service used by the security conference.

U.S. should seek world cooperation on cyber conflict, says ex-CIA director

Posted: 30 Jul 2010 09:00 AM PDT


The U.S. needs to consider working with other leading nations to develop rules of engagement in cyberspace, retired general and former director of the CIA Michael Hayden said during a keynote address at the Black Hat conference here on Thursday.

Former student files second lawsuit over school Webcam spying

Posted: 29 Jul 2010 09:00 AM PDT


Another student this week sued the suburban Philadelphia school district embroiled in allegations of spying on high schoolers using their school-issued laptops.

Important Lessons from the Black Hat ATM Hack

Posted: 29 Jul 2010 09:00 AM PDT


A security researcher named Barnaby Jack amazed attendees at the Black Hat security conference by hacking ATM machines in a session titled "Jackpotting Automated Teller Machines Redux". There are some important lessons to be learned from the hacks Jack demonstrated, and they apply to more than just ATM machines.

The Facebook Data Torrent Debacle: Q&A

Posted: 29 Jul 2010 09:00 AM PDT


Security concerns over Facebook have been raised yet again after a security consultant collected the names and profile URLs for 171 million Facebook accounts from publicly available information. The consultant, Ron Bowes, then uploaded the data as a torrent file allowing anyone with a computer connection to download the data.

Google cleared over StreetView WiFi snooping

Posted: 29 Jul 2010 09:00 AM PDT


The data on WiFi access points gathered by Google in building its Streetview mapping system most likely did not include personal data, the UK Information Commissoner's Office (ICO) has ruled.

Open source web apps often insecure, new tool discovers

Posted: 29 Jul 2010 09:00 AM PDT


Security company Qualys has released a new open source tool, BlindElephant, which can accurately fingerprint web applications down to version level in order to better manage the security issues which now plague such software.

Verizon: Data breaches often caused by configuration errors

Posted: 29 Jul 2010 09:00 AM PDT


Hackers appear to be increasingly counting on configuration problems and programming errors rather than software vulnerabilities in order to steal information from computer systems, according to a new study from Verizon.

Details from 100 million Facebook profiles posted online

Posted: 29 Jul 2010 09:00 AM PDT


Details from 100 million Facebook profiles have been made available on the web by a security consultant.

Rogue Android Apps Secretly Grab User Data

Posted: 29 Jul 2010 09:00 AM PDT


A number of popular Android applications can reportedly collect your mobile device's personal information and then send that data to a Chinese-owned Website. The information in question includes your device's phone number, subscriber identifier number and, in some cases, your voicemail password, according to Phandroid.

Google crowned 'king of malware'

Posted: 29 Jul 2010 09:00 AM PDT


Google has been crowned the 'king of malware' by security company Barracuda Networks, linking to twice as much malware as search rivals Bing, Yahoo and Twitter combined.

ICO: Google Wi-Fi data didn't contain personal information

Posted: 29 Jul 2010 09:00 AM PDT


The Information Commissioner's Office (ICO) has confirmed that data Google accidentally collected from unsecured Wi-Fi networks does not include "any meaningful personal details".

Malware openly available in China, researchers say

Posted: 29 Jul 2010 09:00 AM PDT


Researchers at the Black Hat conference this week said that China is becoming a hotspot for hacking activities at least partly de to easy access to malware tools.

Android App Data Theft: Advantage Apple?

Posted: 29 Jul 2010 09:00 AM PDT


Mobile security firm Lookout embarrassed Android by revealing that a popular wallpaper app was sending sensitive user data to a mysterious Website in China.

Microsoft's bug reports fail to produce prompt patches

Posted: 29 Jul 2010 09:00 AM PDT


The Microsoft Vulnerability Research program said Wednesday that third party developers have patched less than half the bugs it reported to them over the past 12 months.

0 comments:

Post a Comment