Entries by SecurityOrb_Staff

Defcon17 – Jailbreaking and the Law of Reversing

Developers who rely on reverse engineering face a thicket of potential legal obstacles, including license agreements, copyright, the Digital Millennium Copyright Act (DMCA), and the Computer Fraud and Abuse Act (CFAA). Taking iPhone jailbreaking as real-world example, we will review the legal theories Apple has asserted, shedding light on the major legal pitfalls that developers face, and what they can do to avoid them and minimize risks. We will also examine the additional legal issues raised by reverse engineering networked code, such as online video games.

CES on the Hill: Online Infringement & Privacy and Electronic Data Collection

CES on the Hill comes to the nation’s capital this spring, bringing together Members of Congress, their staff and the Washington press to mingle with executives from the CE Industry and get a chance to interact with companies producing innovative technologies that are changing the way we live and work. The next evening CEA hosts its annual Digital Patriots Dinner honoring government officials and technology leaders for their positive influence on both technology and the industry.

New Mac Trojan: Sabpab

A new Trojan known as “Sabpab” could hurt Mac users who run  Java and Microsoft Word. Security researchers are warning users to make sure their computers have the latest software updates from both Apple and Microsoft, and to use anti-virus software. In some cases, manual removal of Sabpab may be needed. Word about Sabpab comes on […]

Executive Coach Chris Coffey is Featured Speaker at ISSA-LA 4th Annual Information Security Summit

World renowned executive and leadership coach Chris Coffey will be a featured speaker at the Los Angeles Chapter of the Information Systems Security Association’
s (ISSA-LA) fourth annual Information Security Summit on Wednesday, May 16, 2012 at Hilton Universal City Hotel in Los Angeles. The theme of the one-day Summit is The Growing Cyber Threat: Protect Your Business.

Mr. Coffey will discuss concepts from his soon-to-be published book Innovative Questions and demonstrate how to turn around the perceptions of others by simply asking the right questions. In the world of high-tech Internet information security, asking the right questions means helping professionals in the field to communicate effectively with executives and business leaders who have difficulty understanding the complexity and the seriousness of cybercrime and how it can affect their businesses.

JS:Cruzer-B, JS/Obfuscated, JS/Cruzer.C.gen, JS/TrojanDownloader.Agent.NKW

A malicious and encoded javascript file was found inside the site content and is being used to distribute malware (from newportalse.com and other domains). Any user visiting the infected site could be compromised (desktop antivirus will flag it as JS:Cruzer-B, JS/Obfuscated, JS/Cruzer.C.gen, JS/TrojanDownloader.Agent.NKW and others, depending on the intermediary domains and AV product).

SC eSymposium: Cyber espionage

Cyber espionage – Those engaging in cyber espionage to steal classified and/or proprietary data from U.S. agencies and other organizations are riding high. Foreign spies, including U.S. allies, are increasingly launching digital assaults against the nation to steal sensitive economic secrets, according to a recent report by the U.S. Office of National Counterintelligence Executive. The theft of this critical information shows that attackers – state-sponsored or not – are enlisting whatever weaknesses in systems they can to steal corporate and government data, often going unnoticed for months. Experts share background on the types of attacks to watch out for and what to do to thwart them.