ggee

/ggee

About ggee

This author has not yet filled in any details.
So far ggee has created 181 blog entries.

Integrated Cyber Exercise II Carnival

Last week was the Integrated Cyber Exercise (ICE) ran by White Wolf Security. The game consisted of three teams that either attack (Red Cell), defend (Blue Cell), or observe. The Blue Cell were responsible for keeping their network alive and functional, and the Red Cell were responsible for attacking the Blue Cell network. Here are [...]

2008-10-08T20:16:00-07:00 October 8th, 2008|Hacking Contests|0 Comments

Hotel Network: Safe From Hackers?

When using a Hotel’s network, do you ever wonder how safe you are when connected to it? In a recent study from the Cornell University School of Hotel Administration, they found that most hotels are not secured properly. The paper called Hotel Network Security: A Study of Computer Networks in U.S. Hotels (registration required) shows [...]

2008-10-06T04:49:55-07:00 October 6th, 2008|Security Vulnerabilities|0 Comments

Infosec Events Around the World

As many of you have noticed, our information security events calendar only covers events held in North America. But information security is not an issue only in North America, but everywhere around the world. We have noticed an increase of good security events outside North America, so we decided to create another google shared calendar. [...]

2008-10-05T13:23:54-07:00 October 5th, 2008|Security Conferences, Site News|0 Comments

Information Security Events in October

Here is a list of events going on this month in the information security space. Virus Bulletin 2008: October 1-3 SecTor 2008: October 7-8 Malware 2008: October 7-8 Day-Con II: October 10-12 eCrime Research Summit: October 15-16 Phreaknic 12: October 24-25 Techno Forensics Conference 2008: October 27-29 ChicagoCon 2008f: October 27-November 1 NYS Cyber Security [...]

2008-10-05T13:07:55-07:00 October 1st, 2008|Security Conferences|2 Comments

McAfee to Acquire Secure Computing

A couple days ago, McAfee announced that they intend to acquire Secure Computing. This move obviously boosts McAfee position in the overall security market. From the McAfee Security Insights Blog: I am excited to announce that McAfee intends to acquire Secure Computing, a leading provider of network security to businesses of all sizes. This pending [...]

2017-03-12T17:40:22-07:00 September 26th, 2008|Vendor News|0 Comments

VoIP Security Web Seminar

Interested in the security aspects of Voice over IP? Global Knowledge recently held a seminar on the subject, and the (free) presentation is now online. The VoIP Security Web Seminar covers several threat vectors, and some tools that exploit those vulnerabilities.

2017-03-12T17:40:22-07:00 September 24th, 2008|Security Workshops|0 Comments

OWASP Israel Conference Presentations

A few days ago, OWASP Israel held a full day, two track conference. The presentations are now available to download on the OWASP Israel 2008 Conference page, and many of them sound interesting. Management Track Web Application Security and Search Engines – Beyond Google Hacking by Amichai Shulman Trends in Web Hacking: What’s Hot in [...]

2017-03-12T17:40:22-07:00 September 22nd, 2008|Security Conferences|0 Comments

Nmap DEFCON 16 Video / 4.75 Released

Fyodor’s Nmap presentation during DEFCON 16 is now available in video form on insecure.org. Fyodor waited to release the video until Nmap version 4.75 was released, since the presentation goes over many of the new features in Nmap. Two cool new features are the open port frequency options, and integration of the Zenmap GUI. Zenmap [...]

2017-03-12T17:40:22-07:00 September 18th, 2008|Security Conferences|1 Comment

Forever 21 Payment Card Breach

Last Friday, Forever 21 issued a notice on their website stating that their systems were illegally accessed to obtain customer payment card information. Approximately 98,930 credit and debit card numbers were illegally accessed, but more than half of the affected payment card numbers are no longer active or have expired expiration dates. We have determined [...]

2017-03-12T17:40:22-07:00 September 17th, 2008|Security Vulnerabilities|0 Comments

DEFCON 16 Audio and (Some) Video

It looks like the security conference archive at good.net has all the DEFCON 16 audio online. But what's better than audio? Video of course, and the folks at DEFCON released four presentations that have been in the news recently. Active HTTPS Cookie Hijacking by Mike Perry DNS Goodness by Dan Kaminsky Stealing the Internet by [...]

2008-09-13T20:48:53-07:00 September 13th, 2008|Security Conferences|1 Comment