AUGUST 1, 2007 | LAS VEGAS -- Black Hat USA
New Threat: Network Eavesdropping
Attackers don't have to be able to read your data in order to hack your network, researchers said in a presentation here today. A smart hacker can learn a great deal about your network and its vulnerabilities simply by analyzing its traffic patterns via the Internet, according to a quartet of researchers who presented their findings.
Read the article HERE.
==============================================
Bush Admin Leaves Holes in Cyberspace
Former Terrorism Czar Richard Clarke: Instead of debating stem cell research or whether to teach evolution in schools, we should be having the debate about how to secure cyberspace.
Richard Clarke remembers standing in the Oval Office and handing President George W. Bush a letter regarding what the nation should do to secure cyberspace. "I think he signed it. I don't think he read it. I don't think he knows what it was," Clarke said during his keynote here at the Black Hat security conference on Aug. 1.
Read the article HERE.
==============================================
Al-Qaida manipulates videos and images
In a presentation at the Black Hat conference here Tuesday, Neal Krawetz of Hacker Factor showed how basic manipulations to images can be revealed through digital analysis.
After presenting on the specific techniques he used, Krawetz launched into what he called the case of "Dr. Z," who happens to be Ayman al-Zawahiri, the No. 2 man in al-Qaida.
Read the article HERE.
Attackers don't have to be able to read your data in order to hack your network, researchers said in a presentation here today. A smart hacker can learn a great deal about your network and its vulnerabilities simply by analyzing its traffic patterns via the Internet, according to a quartet of researchers who presented their findings.
Read the article HERE.
==============================================
Bush Admin Leaves Holes in Cyberspace
Former Terrorism Czar Richard Clarke: Instead of debating stem cell research or whether to teach evolution in schools, we should be having the debate about how to secure cyberspace.
Richard Clarke remembers standing in the Oval Office and handing President George W. Bush a letter regarding what the nation should do to secure cyberspace. "I think he signed it. I don't think he read it. I don't think he knows what it was," Clarke said during his keynote here at the Black Hat security conference on Aug. 1.
Read the article HERE.
==============================================
Al-Qaida manipulates videos and images
In a presentation at the Black Hat conference here Tuesday, Neal Krawetz of Hacker Factor showed how basic manipulations to images can be revealed through digital analysis.
After presenting on the specific techniques he used, Krawetz launched into what he called the case of "Dr. Z," who happens to be Ayman al-Zawahiri, the No. 2 man in al-Qaida.
Read the article HERE.
0 Comments:
Post a Comment
<< Home