FastAccess Anywhere by Sensible Vision
Mario Armstrong has Kim of Sensible Vision demo their security app FastAccess Anywhere at CES 2012. FastAccess Anywhere securely replaces passwords with face recognition to authenticate users for access to their apps and web sites on mobile devices.
CNET’s Livestream of the 2012 Consumer Electronics Showcase: Watch Online
The 2012 Consumer Electronics Showcase, presented by the International Consumer Electronics Association, is this week in Las Vegas, Nevada. The 2012 CES will feature some of consumer electronics’ biggest names and brands unveiling their next big things.
You can view a live stream of CES 2012 below courtesy of CNET.
MobileIron Will Demo Enterprise Mobile Device Management and Security at CES in Verizon Booth
MOUNTAIN VIEW, Calif. , Jan. 10, 2012 /PRNewswire/ — MobileIron, the innovator in enterprise management and security for mobile devices and apps, will be demonstrating its enterprise mobile device management and security platform in the Verizon booth at the Consumer Electronics Show (CES) in Las Vegas . The MobileIron platform was purpose-built for global companies to secure and manage mobile devices and apps. As business mobilizes, IT must support multiple operating systems, secure enterprise data on both corporate and employee-owned devices, and build and deliver mobile apps. MobileIron provides the most scalable solution for mobile device management, security and enterprise app storefronts.
Where:
Verizon
Booth#30259
Pod #1
South Hall Upper Level
Las Vegas Convention Center
When:
12-3 PM on Wednesday, January 11
1-4 PM on Friday, January 13
About MobileIron
Positioned in the Leaders Quadrant of Gartner, Inc.’s Magic Quadrant for Mobile Device Management Software 2011, MobileIron is solving the problems CIOs face as business data and applications move to smartphones and tablets. The MobileIron Virtual Smartphone Platform and the MobileIron Connected Cloud are the first solutions to give IT and users real-time intelligence and control over mobile content, activity, and apps in order to secure the enterprise, reduce wireless cost, and improve the mobile user experience. For more information, please visitwww.mobileiron.com.
Online Registration Closes Friday for 2012 DoD Cyber Crime Conference
11th Annual DoD Cyber Crime Conference 2012
Hyatt Regency Atlanta, Atlanta, GA
Pre-Con Training: Jan. 20-23 | Conference: Jan. 23-27 | Exposition: Jan. 24-26
www.DoDCyberCrime.com
REGISTER NOW to get trained by the experts in revolutionary technologies and techniques for exposing and preventing cyber crime. There is still time to make your plans and reserve your spot.
ONLINE CONFERENCE REGISTRATION
HURRY! Online conference registration closes this Friday, January 13, 2012
ONSITE CONFERENCE REGISTRATION
Those who cannot register online and wish to register at the event in person must provide a letter of sponsorship on the sponsoring Government Agency’s letterhead. The letter needs to include the following:
Name of the individual the Government sponsor is sending to the conference (including job title)
Organization where the sponsored individual is employed
The sponsoring agency point of contact (name, phone number, email address)
IMPORTANT NOTE: The sponsoring agency point of contact will be called to verify the sponsorship; conference credentials will only be issued if that contact person is able to verify the sponsorship.
ACCOMMODATIONS
Visit the TRAVEL page of the Web site for details about accommodations and travel.
CONFERENCE HIGHLIGHTS
• Pre-Conference Hands-on Digital Forensics Training Courses (attorneys can earn CLEs), including
SANS Lethal Digital Forensic Techniques and Memory Analysis
• Classified Cyber Threat Session
• 21 Concurrent Breakout Sessions
• Forensic Tool Expo
• 80+ Exhibitors
• DC3 Digital Crime Scene Challenge (new to the 2012 Conference!)
• 6th Annual DC3 Digital Forensic Challenge Awards Presentations (challenge occurs prior to
conference: www.dc3.mil/challenge)
Visit the event Web site for detailed event information: www.DoDCyberCrime.com
CONTACTS
Attendance: Sharla Warren, (703) 740-1950, SWarren@GovernmentMeetings.com
Speaker Services: Marnie Herren, (703) 740-1933, MHerren@GovernmentMeetings.com
First “Patch Tuesday” of 2012
In the first “Patch Tuesday” of 2012, Microsoft is releasing seven security bulletins to address software issues an attacker could use to remotely exploit and take control of infected Windows systems. Patch Tuesday occurs on the second Tuesday of each month and on that day Microsoft releases security patches to fix vulnerabilities found in their products.
The following table summarizes the security bulletins for this month in order of severity.
| Bulletin ID | Maximum Severity Rating and Vulnerability Impact | Restart Requirement | Affected Software |
|---|---|---|---|
| Bulletin 1 | Critical Remote Code Execution |
Requires restart | Microsoft Windows |
| Bulletin 2 | Important Security Feature Bypass |
Requires restart | Microsoft Windows |
| Bulletin 3 | Important Remote Code Execution |
May require restart | Microsoft Windows |
| Bulletin 4 | Important Elevation of Privilege |
Requires restart | Microsoft Windows |
| Bulletin 5 | Important Remote Code Execution |
May require restart | Microsoft Windows |
| Bulletin 6 | Important Information Disclosure |
Requires restart | Microsoft Windows |
| Bulletin 7 | Important Information Disclosure |
May require restart | Microsoft Developer Tools and Software |
Table 1 – Table Summarizes the Security Bulletins
We are hoping this month’s patches with address the Browser Exploit Against SSL/TLS or the BEAST that seemed to have been canceled last month due a third-party vendor who reported compatibility issues with the patch
Updates for other security issues are available from the following locations:
- Security updates are available from Microsoft Download Center. You can find them most easily by doing a keyword search for “security update”.
- Updates for consumer platforms are available from Microsoft Update.
- You can obtain the security updates offered this month on Windows Update, from Download Center on Security and Critical Releases ISO CD Image files. For more information, see Microsoft Knowledge Base Article 913086.
If you are interested in learning more on how to improve security and optimize your IT infrastructure, and would like to participate with other IT Pros on security topics check out the IT Pro Security Community.
Also strengthening its software is Adobe, which on Jan. 10th released critical updates for Adobe Reader X and Adobe Acrobat X and Google, which recently released Chrome version 16.0.9212.75, fixing three high-priority bugs in the Web browser.
ShmooCon 2012 – January 27-29
Different – ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues. The first day is a single track of speed talks called One Track Mind. The next two days bring three tracks: Build It, Break It and Bring It On.
Affordable – ShmooCon is about high quality without the high price. Keep in mind that space is limited and we’ve sold out quickly every year.
Accessible – ShmooCon is held in Washington, DC at the Washington Hilton Hotel, just a few short blocks from the DC metro. Fly into DCA, IAD or BWI or take a train to Union Station and you’re just a short cab ride away from the con.Entertaining – Brain melting from all the cool tech you’re learning? Be sure to check out the other events running during ShmooCon, including the Hacker Arcade, ShmooCon Labs, Hack-or-Halo and more. Saturday night is party night, where typically we throw an off site bash just to shake things up a bit.
