Defcon17 – Jailbreaking and the Law of Reversing

/
Developers who rely on reverse engineering face a thicket of potential legal obstacles, including license agreements, copyright, the Digital Millennium Copyright Act (DMCA), and the Computer Fraud and Abuse Act (CFAA). Taking iPhone jailbreaking as real-world example, we will review the legal theories Apple has asserted, shedding light on the major legal pitfalls that developers face, and what they can do to avoid them and minimize risks. We will also examine the additional legal issues raised by reverse engineering networked code, such as online video games.

DNSChanger Malware: Produced by US-CERT

/
US-CERT encourages users and administrators to ensure their systems are not infected with the DNSChanger malware by utilizing tools and resources available at the DNS Changer Working Group (DCWG) website.

Splunk Live! 2012 in Washington, DC

/
Why do over 3,700 companies, including more than half of the Fortune 100, use Splunk to gain new levels of visibility and insight from their machine data? It's because Splunk is the fastest, easiest way to put your machine data to work.

CES on the Hill: Online Infringement & Privacy and Electronic Data Collection

/
CES on the Hill comes to the nation's capital this spring, bringing together Members of Congress, their staff and the Washington press to mingle with executives from the CE Industry and get a chance to interact with companies producing innovative technologies that are changing the way we live and work. The next evening CEA hosts its annual Digital Patriots Dinner honoring government officials and technology leaders for their positive influence on both technology and the industry.

New Mac Trojan: Sabpab

/
A new Trojan known as "Sabpab" could hurt Mac users who run…

Sabpab, Another Mac OS X backdoor Trojan horse as been discovered

/
More malware for the Mac OS X platform has been discovered, hot on the heels of the revelation that some 600,000 Macs had been infected in the Flashback attack. And just like Flashback, the new Trojan doesn't require any user interaction to infect your Apple Mac. The Sabpab Trojan horse exploits the same drive-by Java vulnerability used to create the Flashback botnet.

Executive Coach Chris Coffey is Featured Speaker at ISSA-LA 4th Annual Information Security Summit

/
World renowned executive and leadership coach Chris Coffey will be a featured speaker at the Los Angeles Chapter of the Information Systems Security Association’ s (ISSA-LA) fourth annual Information Security Summit on Wednesday, May 16, 2012 at Hilton Universal City Hotel in Los Angeles. The theme of the one-day Summit is The Growing Cyber Threat: Protect Your Business. Mr. Coffey will discuss concepts from his soon-to-be published book Innovative Questions and demonstrate how to turn around the perceptions of others by simply asking the right questions. In the world of high-tech Internet information security, asking the right questions means helping professionals in the field to communicate effectively with executives and business leaders who have difficulty understanding the complexity and the seriousness of cybercrime and how it can affect their businesses.

JS:Cruzer-B, JS/Obfuscated, JS/Cruzer.C.gen, JS/TrojanDownloader.Agent.NKW

/
A malicious and encoded javascript file was found inside the site content and is being used to distribute malware (from newportalse.com and other domains). Any user visiting the infected site could be compromised (desktop antivirus will flag it as JS:Cruzer-B, JS/Obfuscated, JS/Cruzer.C.gen, JS/TrojanDownloader.Agent.NKW and others, depending on the intermediary domains and AV product).

SANSFIRE 2012 is coming to Washington, DC

/
SANSFIRE 2012 will take place at our Hilton Washington and Towers campus, July 6-15. There will be more than 40 SANS IT Security Training courses available. This training event is powered by the (ISC) Internet Storm Center and is an opportunity to meet the ISC handlers.

SC eSymposium: Cyber espionage

/
Cyber espionage - Those engaging in cyber espionage to steal classified and/or proprietary data from U.S. agencies and other organizations are riding high. Foreign spies, including U.S. allies, are increasingly launching digital assaults against the nation to steal sensitive economic secrets, according to a recent report by the U.S. Office of National Counterintelligence Executive. The theft of this critical information shows that attackers - state-sponsored or not - are enlisting whatever weaknesses in systems they can to steal corporate and government data, often going unnoticed for months. Experts share background on the types of attacks to watch out for and what to do to thwart them.