Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Books

Submission + - Network Forensics: Tracking Hackers through Cyberspace (rsaconference.com)

rye writes: "'With a title like Network Forensics: Tracking Hackers through Cyberspace, the book at first sounds like a cheesy novel,' writes Ben Rothke of RSA. 'But by page 25, you will quickly see this is the real thing. By the time you hit the last page, you will have read the collective wisdom of two of the smartest minds in the space. ...In 12 densely written chapters at just over 500 pages, the book covers nearly every aspect within network and digital forensics.'"

Submission + - Forensic Contest #10 is Live, Winner Gets a Black Hat BLACK CARD (forensicscontest.com)

rye writes: "Forensics Contest #10 is Live. Winner of the contest gets a BlackHat BLACK CARD which is two free years of entrance to Black Hat (plus, there's the coolness factor). The most elegant solution wins the Black Hat BLACK CARD. There are also prizes for the first correct solution, as well as 2nd and 3rd place. Deadline is July 23, 2012. Solutions will be announced at the Network Forensics Black Hat class on July 24.

Here's the case: It’s been three weeks since the PaulDotCom crew went missing. Through extensive research and cyberstalking, millions of PDC fans gathered information relating to their disappearance and hired you to find them. You are the forensic investigator. You're given a hollow spy coin and a packet capture. Can you solve the puzzle and find out what happened to PaulDotCom?

Enter the challenge and get more info at ForensicsContest.Com."

Security

Submission + - The L33t Pill (forensicscontest.com)

rye writes: The Network Forensics Puzzle Contest has opened their DEFCON 2011 contest for public competition, and it's AWESOME. Six rounds, five packet captures, one Truecrypt volume, and a prize for the Most Elegant Solution. Check it out:

"The lead chemist of a high-profile pharmaceutical company was involved in a serious accident, leaving him in a coma days before the release of the company’s highly publicized '133t pill.' The chemist was the only person in possession of the list of ingredients required to produce the wonder drug, and it is not known if he will ever recover. All chemical evidence of the drug has been destroyed, but the company believes that the missing ingredients may have been stored electronically. You have been hired as a forensic investigator, to recover the final ingredient of their 133t pill. Can you find the missing ingredient?"

Privacy

Submission + - What Does DHS Know About You? (philosecurity.org)

Sherri Davidoff writes: "Here's a real copy of an American citizen's DHS Travel Record retrieved from the U.S. Customs and Border Patrol's Automated Targeting System (ATS). This was obtained through a FOIA/Privacy Act request... The document reveals that the DHS is storing the reader's:
  • Credit card number and expiration
  • IP address used to make web travel reservations
  • Hotel information and itinerary
  • Full airline itinerary, including flight numbers and seat numbers
  • Phone numbers, incl. business, home & cell
  • Every frequent flyer and hotel number associated with the subject, even ones not used for the specific reservation
"

Comment Re:Please don't think of the children. (Score 1) 1092

First it was tracking consumers. Look at the location histories that public transit agencies store (EZ-Pass, Metro Card, etc), not to mention credit card and cell companies that track and analyze consumer location info for the company's benefit. Money is the greatest motivator.

After these systems are set up, police realize that they can gain access and use them to track suspects or "terrorists." Once the capabilities are well-publicized, parents get interested and companies spew out spinoff consumer-friendly tracking tools... such as Verizon's Chaperone, which more average people buy... which LE will subsequently take advantage of...

Every new advance in location tracking technology is an exploitative cycle between the market forces, Big Brother and normal human attachments.

Medicine

Submission + - Doctors Scan Photo ID for Treatment (philosecurity.org)

Sherri Davidoff writes: "Spurred by the FTC's "Red Flags Rule," more health care clinics are requiring photo identification and storing high-resolution copies in their computer systems. Ironically, this probably puts patients at greater risk of identity theft, not less. From the article: "Walking into the doctor's office, I was surprised to see a new sign which read: 'Red Flag Identity Theft Rule: We are now required by law to ask for a Photo ID at the time of each visit. Please have your Photo ID ready for the receptionist to scan.' As an avid bicyclist, I wasn't carrying a driver's license. 'I'm sorry, we'll have to reschedule you,' said the receptionist.

"Everyone should have access to medical care- not just people who have registered with the government and obtained a photo ID. Furthermore, patients should have the right to health care without being forced to give up control of our personal information. As a patient, I don't really want a copy of my Photo ID stored on a crappy unpatched Windows box at my doctor's office. Today's patients do not even have the right to know how well doctor's offices and hospitals are secured, even in the face of constant reports of medical data breaches. That's sick.""

Slashdot Top Deals

Remember to say hello to your bank teller.

Working...