Archive for August, 2010

It’s tiem*) again: NAT66

August 29, 2010

ITT *) : NAT66 (picture unrelated) In this thread we discuss NAT Maybe the picture is related. We all want to have our communications as safe as possible and we choose appropriate security mechanisms to achieve this goal. We follow “Best Current Practices”, recommendations from security experts and we follow traditions in our own organization. […]

Tags: ,
Posted in Internet, Security Comments Off on It’s tiem*) again: NAT66

Are Hackers Speeding on the Information Highway?

August 27, 2010

(or “Has our Security Crashed?”) I just came back from a discussion with our national CERT and took some thoughts back home: (TL;DR section at the end) I have the impression, that some of our security mechanisms, which seemed so sturdy and and healthy until recently, are turning soft and weak in our hands. The […]

Tags: ,
Posted in High Entropy Comments Off on Are Hackers Speeding on the Information Highway?

Schedule for DeepSec 2010 published

August 20, 2010

Reviewing the submissions took us a while longer than anticipated. The reason was the high-quality content you submitted. We had to make some tough decisions and could have easily filled three or four days of In-Depth security talks and many more workshops. We hope that the schedule we published yesterday satisfies your interest and gives […]

Tags:
Posted in Schedule Comments Off on Schedule for DeepSec 2010 published

CfP revision is almost done

August 11, 2010

We’re almost finished with the review of presentations and trainings submitted via the Call for Papers form. Everyone will get a notification during the next couple of days. You really sent us a lot of high-quality content, and we are proud to set the stage for your research results. Some vendors might not be as […]

Tags: ,
Posted in Administrivia, Schedule Comments Off on CfP revision is almost done

Sneak Preview – your cellphone can be tapped

August 2, 2010

You probably have a cellphone. Your company might even provide an additional one. Your boss most certainly uses a cellphone. What do you use it for? Do you share details about your private life via phone conversations? Did you ever talk to a business partner about confidential offers? Do you rely on cellphone when it […]

Tags: , ,
Posted in Schedule, Security Comments Off on Sneak Preview – your cellphone can be tapped

Hole196 debunked?

August 1, 2010

(Warning: some technical details, not suited for the TL;DR type of audience) “WPA2 vulnerability discovered” was a headline that caught my attention for several reasons: Someone detected a security flaw in 802.11 RSNA (vulgo “WPA2”) that slipped Chuck Norris’ attention for 3 years (replace the name with any respected security researcher). It’s from a Best-of-breed, […]

Tags: ,
Posted in Security Comments Off on Hole196 debunked?