| |
Current Topic: Computer Security |
|
Do You Email Under the Influence? Try ‘Mail Goggles’ » The StartUp Blog at PartnerUp |
|
|
Topic: Computer Security |
12:11 pm EDT, Oct 20, 2008 |
Google’s new test feature, “Mail Goggles,” part of the free Gmail service, can save those who send the occasional (or frequent) tipsy (or inebriated) email a whole lot of regret and an even bigger headache in the morning. When the goggles are active, they will require you to solve a few easy math problems before you hit “send.” Basically Google’s logic is that if you’re sober enough to solve the problems, then you’re sober enough to deal with the repercussions of your actions.
Ha! Do You Email Under the Influence? Try ‘Mail Goggles’ » The StartUp Blog at PartnerUp |
|
Topic: Computer Security |
10:12 am EDT, Oct 9, 2008 |
VeriSign, often criticized for trying to exercise too much control over the net, counter-proposes that its role be enlarged. Under its proposal (.pdf), the root zone file will be signed using keys it distributes to the root server operators and if enough of them sign the file, then it is considered official.
For some reason Verisign thinks they should be able to sign the root keys instead of ICANN. I can see absolutely no reason why that would be a good idea. Verisign and DNS Sec |
|
DNSSEC-bis for complete beginners (like me) |
|
|
Topic: Computer Security |
5:48 pm EDT, Sep 24, 2008 |
Below you will find explained all concepts of DNSSEC-bis in a way that furthers understanding.
A quick primer on DNSSEC, which you will need to understand shortly, I think. DNSSEC-bis for complete beginners (like me) |
|
Feds tighten security on .gov - Network World |
|
|
Topic: Computer Security |
2:33 pm EDT, Sep 22, 2008 |
All federal agencies are deploying DNS Security Extensions (DNSSEC) on the .gov top-level domain, and some expect that once that rollout is complete, banks and other businesses might be encouraged to follow suit for their sites.
Feds tighten security on .gov - Network World |
|
More on BGP Attacks -- Updated | Threat Level from Wired.com |
|
|
Topic: Computer Security |
11:17 am EDT, Aug 27, 2008 |
you can read how Anton Kapela and Alex Pilosov conducted their interception of the DefCon network traffic in the slides from their talk (.ppt). Their DefCon presentation, by the way, was an unscheduled, last-minute talk that occurred at the end of the last day of the DefCon conference, so it hadn't appeared on the conference schedule.
Worth a look. More on BGP Attacks -- Updated | Threat Level from Wired.com |
|
Neosploit exploit kit shutters operations? | Zero Day | ZDNet.com |
|
|
Topic: Computer Security |
11:06 am EDT, Jul 29, 2008 |
“Unfortunately, supporting our product is no longer possible. We apologize for any inconvenience, but business is business since the amount of time spent on this project does not justify itself. We tried hard to satisfy our clients’ needs during the last few months, but the support had to end at some point. We were 1.5 years with you and hope that this was a good time for your business. Now we will not be with you, but nevertheless we wish that your businesses will prosper for a long time! Good luck all, The Neosploit Team!”
"We're legitimate business men!" Neosploit exploit kit shutters operations? | Zero Day | ZDNet.com |
|
Dutch chipmaker sues to silence security researchers | Tech news blog - CNET News.com |
|
|
Topic: Computer Security |
8:09 am EDT, Jul 13, 2008 |
Dutch chipmaker NXP Semiconductors has sued a university in The Netherlands to block publication of research that details security flaws in NXP's Mifare Classic wireless smart cards, which are used in transit and building entry systems around the world.
Dutch chipmaker sues to silence security researchers | Tech news blog - CNET News.com |
|
Comcast Hijackers Say They Warned the Company First | Threat Level from Wired.com |
|
|
Topic: Computer Security |
11:32 am EDT, May 30, 2008 |
The computer attackers who took down Comcast's homepage and webmail service for over five hours Thursday say they didn't know what they were getting themselves into. In an hour-long telephone conference call with Threat Level, the hackers known as "Defiant" and "EBK" expressed astonishment over the attention their DNS hijacking has garnered. In the call, the pair bounded freely between jubilant excitement over the impact of their attack, and fatalism that they would soon be arrested for it. Neither hacker would identify their full names or locations. Defiant's MySpace profile lists him in Cashville, Tennessee, but he says that's incorrect. His girlfriend lists herself in New York. Threat Level expects both hackers' names and locations will emerge shortly.
This is entertaining... One of those cases where you really gotta sympathize with the perps. It was a prank - fairly innocent. Egg on Comcast's face for getting outsmarted by a couple of teenage pot heads. Hope they don't throw the book at them. This isn't the mafia here. Comcast Hijackers Say They Warned the Company First | Threat Level from Wired.com |
|