Kali Linux to Add “Data Nuke” Option

Kali Linux is an open-source operating system based on the popular BackTrack Linux suite. The team (Offensive Security) has introduced some new features such as Logical Volume Management (LVM) and Linux Unified Key Setup (LUKS) for full-disk encryption with a “data nuke” password option that would render the drive inaccessible if entered.

If you are currently operating Kali Linux, you can just upgrade the current version by issuing the following commands:

root@kali:~# apt-get update

root@kali:~# apt-get dist-upgrade

or

you can always download complete ISO at: http://www.kali.org/downloads/.

During installation, Kali Linux allows users to configure a password for the root user. However, should you decide to boot the live image instead, the i386, amd64, VMWare and ARM images are configured with the default root password – “toor“, without the quotes.

For more information on this topic, also checkout:

Developers mull adding data nuke to Kali Linux – By Michael Lee at ZDNet – http://www.zdnet.com/developers-mull-adding-data-nuke-to-kali-linux-7000024862/

Death of Hero Hacker Barnaby Jack Ruled a Drug Overdose

After months of dark rumors and speculation, a medical examiner’s report reveals what really happened to the New Zealand-born hacker.

The death of famed “white hat” hacker Barnaby Jack, known as a genius in the information security world and the life of the party to friends, has been ruled a drug overdose by the San Francisco medical examiner’s office.

According to the report, Jack died as a result of a mix of heroin, cocaine, Benadryl, and Xanax.

The report, issued over five months after the 35-year-old’s death in July, will bring to an end the wild and often conspiratorial speculation over how a talented, seemingly healthy man in the prime of his life could have died days before he was meant to give an anticipated demonstration at the annual Black Hat convention in Las Vegas, the world’s largest hackers’ conference. In his presentation, “Implantable Medical Devices: Hacking Humans”, Jack was slated to show off the fruits of his latest research by hacking into pacemakers and implanted defibrillators—a feat he asserted could kill a man from 30 feet away.

But Jack would never have used his work to actually hurt anyone. “I suppose I’m on the good side of the fence,” he told a reporter in 2010.

The planned implantable device hack was just the latest from the excitable researcher, known for high-profile performances that captured the imaginations of hackers and laymen alike and brought attention to the issue of technology security—a field Jack saw as more important than ever. (“Has there ever been a box connected to the Internet that people haven’t tried to break into?” he recently asked.

Read the rest here.

Information Security Careers: Become the Next Cyber Superhero

By Callie Malvik on December 31, 2013

America has faced its share of threats. The domestic efforts that were once devoted to combating organized crime and drug trafficking were shifted to terrorism one September morning in 2001. Twelve years later FBI director James Comey predicts that cyberthreats will soon rival terrorism as “the primary danger facing the United States.”

Cybercrime poses a significant threat to our national security but it also has detrimental effects in your own backyard. Data breaches are among the most common and costly security failures for businesses of all sizes, with the average cost of a single cyberattack equaling $300,000.

Cybercrime is on the rise at a national and local level, which means organizations are desperate for qualified information security personnel to help protect their assets. The villains may not be masked or armed but they’re more dangerous than Darth Vader and The Joker combined.

So if the thought of being a “cyber superhero” excites you, there is no better time than now to act on it! We enlisted a few experts to share some insight on the future of the industry to help you determine if you’ve got the chops to combat cyber villains.

What is the outlook for information security careers?

Cybercrime is a serious threat that will not soon fade. So it should come as no surprise that the U.S. Department of Labor predicts employment in the information security field will grow as much as 28 percent in the next decade, which is nearly twice the average projected growth rate among all occupations.

This is because organizations are recognizing the need for information security experts to protect, detect and respond to malicious activity on their networks. These responsibilities used to fall upon general technology practitioners, according to Kellep Charles, information security analyst at NASA and executive editor of SecurityOrb.com.

Charles says employing security specialists ensures security incidents are identified and corrected much faster, thus saving the entire organization time and money.

Read the rest here

(ISC)2 Security Congress 2014 Call for Speakers – Submit Proposal by Feb. 10th

(ISC)2 Security Congress 2014

Call for Speakers – Submit Proposal by Feb. 10th

If you are an expert infosecurity professional, share your experience and knowledge
at the industry’s premier event by submitting your proposal! Once again colocated
with ASIS International 60th Annual Seminar and Exhibits, (ISC)2 Security Congress
2014 is expected to bring together more than 20,000 professional worldwide from both
the traditional and information security disciplines. The goal of (ISC)2 Security
Congress is to offer invaluable education, networking and career advancement
opportunities to all levels of information security professionals.

2014 (ISC)2 Security Congress Tracks include:

  • Cloud Security
  • Swiss Army Knife
  • Application Security/Software Assurance
  • Mobile Security & Social Networking
  • Governance, Regulation & Compliance
  • Malware
  • Professional Development
  • Digital Forensics
  • Healthcare Security

Join us in Atlanta, GA Sept. 29th – Oct. 2nd for the Fourth Annual (ISC)2 Security Congress, which will be colocated with the ASIS International 60th Annual Seminar and Exhibits.
In order to be considered, please submit your proposal by February 10, 2014.