Weekend Reading
Spam weapon helps preserve books
A weapon used to fight spammers is now helping university researchers preserve old books and manuscripts. Carnegie Mellon is using this test to help decipher words in books that machines cannot read by letting sites use them to authenticate log-ins.
Take a look HERE.
==================================================================
Think your job's tough? Try protecting Net access for the U.S. Army
Blackard and other members of the 1st Information Operations Command took part in the Hack In The Box (HITB) security conference last month in Kuala Lumpur, Malaysia, where they attended training sessions and competed against hackers in a capture-the-flag contest.
Take a look HERE.
==================================================================
CERT Advances Secure Coding Standards
The secure coding movement got a little boost as CERT and Fortify Software announced that they have teamed up to automate part of the process of building security into software -- specifically, automating compliance with CERT's C and C++ Secure Coding Standard.
Take a look HERE.
==================================================================
Exploit auctioneer speaks at Microsoft hacker conference
A director of the WabiSabiLabi exploit auction platform (WSLabi) has presented at Microsoft's internal, invitation only Blue Hat hacker conference, speakers at which include the crème de la crème of the security industry.
Take a look HERE.
==================================================================
Yahoo Returns to its Roots with 'Search Assist'
Sensing a possible runaway victory by Google in the critical search category, both Microsoft and Yahoo are busy trying to improve the "search experience." The question Yahoo's been facing is how to help its users feel they've found what they're looking for, without kicking them out of Yahoo territory so fast they forget it was Yahoo that brought them there.
But Yahoo's latest enhancement, launched this morning, may be new to the search page but not all that new to the search experience: Its new "Search Assist" acts like an auto-complete feature, intercepting your text as you type and offering a handful of completed search queries.
Take a look HERE.
==================================================================
Top 14 VoIP vulnerabilities
How are VoIP networks weak and vulnerable to attack and catastrophic failure? Securing VoIP Networks, the new book by Peter Thermos and Ari Takanen, looks at VoIP infrastructure and analyzes its vulnerabilities much as the Open Web Application Security Project did for Web-related vulnerabilities and Mitre did with its Common Weakness Enumeration dictionary for software. And it’s about human failings, too, not just technology problems.
Take a look HERE.
==================================================================
Mozilla Thunderbird vs. Microsoft Outlook
Along the same lines as what I said last month about Internet Explorer vs. Firefox, I am convinced I’m safer using pretty much any email client other than Microsoft’s Outlook. Outlook is simply not as secure as its competitors.
Take a look HERE.
A weapon used to fight spammers is now helping university researchers preserve old books and manuscripts. Carnegie Mellon is using this test to help decipher words in books that machines cannot read by letting sites use them to authenticate log-ins.
Take a look HERE.
==================================================================
Think your job's tough? Try protecting Net access for the U.S. Army
Blackard and other members of the 1st Information Operations Command took part in the Hack In The Box (HITB) security conference last month in Kuala Lumpur, Malaysia, where they attended training sessions and competed against hackers in a capture-the-flag contest.
Take a look HERE.
==================================================================
CERT Advances Secure Coding Standards
The secure coding movement got a little boost as CERT and Fortify Software announced that they have teamed up to automate part of the process of building security into software -- specifically, automating compliance with CERT's C and C++ Secure Coding Standard.
Take a look HERE.
==================================================================
Exploit auctioneer speaks at Microsoft hacker conference
A director of the WabiSabiLabi exploit auction platform (WSLabi) has presented at Microsoft's internal, invitation only Blue Hat hacker conference, speakers at which include the crème de la crème of the security industry.
Take a look HERE.
==================================================================
Yahoo Returns to its Roots with 'Search Assist'
Sensing a possible runaway victory by Google in the critical search category, both Microsoft and Yahoo are busy trying to improve the "search experience." The question Yahoo's been facing is how to help its users feel they've found what they're looking for, without kicking them out of Yahoo territory so fast they forget it was Yahoo that brought them there.
But Yahoo's latest enhancement, launched this morning, may be new to the search page but not all that new to the search experience: Its new "Search Assist" acts like an auto-complete feature, intercepting your text as you type and offering a handful of completed search queries.
Take a look HERE.
==================================================================
Top 14 VoIP vulnerabilities
How are VoIP networks weak and vulnerable to attack and catastrophic failure? Securing VoIP Networks, the new book by Peter Thermos and Ari Takanen, looks at VoIP infrastructure and analyzes its vulnerabilities much as the Open Web Application Security Project did for Web-related vulnerabilities and Mitre did with its Common Weakness Enumeration dictionary for software. And it’s about human failings, too, not just technology problems.
Take a look HERE.
==================================================================
Mozilla Thunderbird vs. Microsoft Outlook
Along the same lines as what I said last month about Internet Explorer vs. Firefox, I am convinced I’m safer using pretty much any email client other than Microsoft’s Outlook. Outlook is simply not as secure as its competitors.
Take a look HERE.
0 Comments:
Post a Comment
<< Home