Nsauditor Network Security Auditor - Advanced All-In-One Network Tools Suite!
  Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor Network Bandwidth Monitor
NBMonitor tracks Internet bandwidth usage (upload and downloads) and shows process names initiated network connections...
Network Hardware Inventory Software Network Hardware Inventory Software
Nsasoft Hardware Software Inventory is a powerful network inventory software for home, office and enterprise networks...
BlueAuditor Monitors Mobile Devices in Wireless Network BlueAuditor Monitors Mobile Devices in Wireless Network
BlueAuditor is a wireless personal area network auditor and easy-to-use program for detecting and monitoring mobile devices in a wireless network...
Network Access Monitoring Network Access Monitoring
ShareAlarmPro allows easily perform network shares and folder monitoring, block unwanted users attempting to access secured shares...
Network Shares Monitoring Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy...
NetworkSleuth Network File Search Utili NetworkSleuth Network File Search Utiliy
NetworkSleuth is a network file searching utility, that allows you to quickly locate files across a network....
Product Key Finder Product Key Finder
Product Key Explorer enables you to quickly recover over 3000 popular software product keys from network computers...
Backup Key Recovery Crashed Drive Keys Recovery Backup Key Recovery Crashed Drive Keys Recovery
Backup Key Recovery retrieves product keys for Windows, MS Office, SQL Server, Adobe products and more than 2500 popular software products...
 
 

Network Security News

Security, Hacker Conferences Have Tech Industry Buzzing

Aug 6 2011

Stories about lost wages aren't the only scary things being talked about in Sin City this week. The best security researchers and hackers from around the world have gathered in Las Vegas, and news about their work has been creeping out like a toxic flood.

The Black Hat security conference wrapped up Thursday and the Def Con hacker conference is going on now and is scheduled to end Sunday.

Here's a roundup of some of the stories that have technophiles buzzing.

- Murder by hacking. Diabetic and security researcher Jay Radcliffe demonstrated how an attacker with a powerful antenna could be up to a half mile away from a victim yet launch a wireless hack to remotely control an insulin pump and potentially kill the victim. According to ZDNet, having the pump's serial number is one key to performing the hack, which is concerning since many products ship with product codes displayed on outside packaging. Read more at ZDNet and PCWorld.

- Your house can be hacked. Researchers Dave Kennedy and Rob Simon showed how they could disrupt and spy on home automation networks in residences and offices using devices connected to Ethernet networks that communicate via public power lines. Once plugged into a power outlet outside or near the target building, the X10 Black Out device they created can be programmed to jam the signals that turn lights on and off and open doors, as well as disable security systems, change climate controls, and interfere with other functions of a home automation network. They also showed off their X10 Sniffer device, which can see whether the doors are open and lights are on and can track people with motion sensors and see what part of the house they might be in. Read more.

- Long-term global cyberspying uncovered. McAfee issued a report that said it had identified a single perpetrator of cyberattacks that lasted up to five years on a wide range of governments, American corporations and even United Nations groups, and that the pattern of targets suggested the attacker was a "state actor." After blogging about "Operation Shady RAT," McAfee VP of Threat Research Dmitri Alperovitch was thronged by reporters. Alperovitch said the cyber-spying campaign was the "biggest transfer of wealth in terms of intellectual property in human history." Read more at The New York Times and VentureBeat.

- New threat: Hacking batteries. Security researcher Charlie Miller demonstrated how he was able to completely control the microprocessor embedded in batteries used in Apple Macintosh laptops and then remove or bypass the built-in safeguards. He suggested it would be possible to overheat a battery and start a fire by convincing a controller that the battery was discharged, even though it was completely full, but said he has not tried it and an analog fuse may prevent disaster. Read more at CNET and PCWorld.

- Why Facebook's facial recognition is creepy. Alessandro Acquisti, Ralph Gross, and Fred Stutzman showed how they took publicly available photos of students from Facebook and then used facial recognition technology to identify the students as they looked into a webcam. In another test, the researchers took photos from 277,978 Facebook profiles and compared them to profiles from an online dating Website where people don't use their real names. They were able to correctly identify 10 percent of the dating site's members using facial recognition technology. Read more.

In other Black Hat news, Microsoft announced a contest that offers more than $250,000 in prizes to security researchers who can develop better solutions to counter security threats. Conference organizers also handed out Pwnie Awards, including one to Sony for "Most Epic Fail."Unmanned spy plane cracks Wi-Fi passwords, intercepts cell phone conversations. Security researchers Mike Tassey and Richard Perkins unveiled a remote controlled, unmanned aerial vehicle capable of cracking Wi-Fi passwords, exploiting weak wireless access points and mimicking a GSM tower to intercept cell phone conversations. They built the Wi-Fi Aerial Surveillance Platform to show how an ordinary remote controlled hobby airplane can be easily converted into something more sinister.

Sours From

View more news

 
  Most Popular Articles
 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking Network Security Network Inventory Software Information Security
 
 
  Partner Sites
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

Product Key Explorer
Product Key Explorer quickly recovers and displays product key, including Windows 7 keys, Windows Vista key, Windows XP product key, Microsoft Office 7 product key, MS office 2010 key, Adobe Photoshop, Adobe CS5, CS4, CS3, SQL Server, Electronic Arts games and more than 3000 popular software products:
www.product-key-explorer.com/