Best viewed in Firefox and Flock browsers
Three Ways to Get FREE Technical Support here.
1. Search for existing articles ans solutions using the search box.
2. Email your questions to FreeHelp@cesabarre.com
3. Post your questions right here for everyone to see and help you.

[TechRepublic] DEFCON and Black Hat: Highlights from the conferences

Trouble viewing this mail? Read it online | Manage my newsletters | Unsubscribe

IT Security

TechRepublic Member | August 09, 2011

Deb does DEFCON: Hacking conference tackles cyberwar and civil liberties

There's a little more rebellion and fun among the free spirits at DEFCON after the more buttoned-down BlackHat, according to Deb Shinder. But the topics are serious business. Read more

Resource of the day

eBook: Learn more about Dell Workstations here

Choose your ideal solution from Dell's highest-performing and most scalable systems. Dell? Precision? workstations are specifically designed for professionals in engineering, product design, animation, digital imaging and other graphics-intensive occupations. Learn more about Dell Workstations here.


Wrapping up Black Hat 2011 with Robert Clark of the U.S. Cyber Command

Deb Shinder reports from Black Hat 2011. On day two, she attended a talk on cyberlaw issues given by Robert Clark of U.S. Army Cyber Command. Read more

Day two of Black Hat 2011: Peiter (Mudge) Zatko

Deb Shinder reports on Peiter Zatko's address from Black Hat 2011, where he talked about system complexity and increasing attack surfaces. Read more

Black Hat 2011 update: Macs in the crosshairs, Kaminsky on BitCoin

Deb Shinder reports on two of the sessions from Black Hat 2011 -- insecure default settings in Mac OS X and Dan Kaminsky on online payment systems, including BitCoin. Read more

Black Hat 2011 update: Keynote address complete with sirens

Deb Shinder kicks off the news from Black Hat 2011 with a report from the keynote address and a mysterious series of alarms at the conference center. Read more

Black Hat demo shows vulnerability of insulin pumps to remote attack

Security analyst Jerome Radcliffe had good reason to research the vulnerability of insulin pumps and similar medical devices to remote attack -- he's a diabetic. What he found out is pretty scary. Read more

Attention, world, you've been pwned! McAfee details global cyber-espionage campaign

McAfee reports that large-scale cyber warfare operations against the U.S. and other global targets have been well underway for five years in an extensive campaign dubbed "Operation Shady Rat." Read more

Additional TechRepublic resources

 

Zeus subverts mobile OSs: Is Android next?

Believe two-factor authentication using SMS texts is secure? Michael Kassner reports that the Zeus malware now has a smartphone partner called Zitmo. Read more

No trust for Google search and the power it wields

Back in June 2011 we asked if you trusted Google search to return the best objective results. The poll results indicate that the majority does not, but they do worry about the power that gives the company. Read more

How companies can prepare for cloud outages

When your cloud service goes down, you learn a hard lesson pretty quickly. Here's what smart companies do to prepare for an outage. Read more

Has Microsoft gotten better at security or just less relevant?

Deb Shinder noticed a change in attitude at the 2011 versions of BlackHat and Defcon 19 when it comes to Microsoft. She explains in this week's Microsoft InSights Blog post. Read more

Featured multimedia

 

Gallery: Ten computer viruses that changed the world

In the last 25 years, the state of the art in automated malfeasance has progressed to the point that it's part of the armory of international geopolitics. View on site


Focus on Chromebooks

Your questions answered: What Chromebooks can and can't do

While IT pros scoff, Google Chromebooks will likely seduce businesses

Three things Chromebooks need to fix to win buyers

Samsung and Acer Chromebooks: More netbook than notebook


Today's recommended downloads

KPMG, HP simplify HP records management - A Case Study

Prepare an ERM classification scheme

eBook: Learn more about Dell Workstations here

Looking for a solution to curb your organization's rising IT costs?

Evaluating Unified Communications Solutions (Cisco Systems)


10 immutable laws of mistakes

Mistakes are inevitable. But as Allan Norton explains, certain laws govern how we deal with them, learn from them, conceal them, and even profit from them.




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is ceasar@cesabarre.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2011 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment