Forgot your password?
typodupeerror

Comment: Re:Three Words: (Score 1) 244

by pimpin apollo (#23086452) Attached to: What Should We Do About Security Ethics?
I agree. And if you both want to do this, and maintain some ethical standard, I would suggest getting a lawyer. Granted this is going to take some money, but find yourself a lawyer, and see what your options you have, realistically. This is the safest way to go about it. There are whistle blower laws carved out all over the place, but they're often narrow, and complex. It's not the kind of thing you want to take lightly or without some extreme care.
Security

Guerrilla IT, Embracing the Superuser? 423

Posted by CmdrTaco
from the which-one-am-i-again dept.
snydeq writes "First it's letting users manage their own PCs and now it's sanctioning the shadow IT projects they do on the down low: 'You probably know them. They're the ones who installed their own Wi-Fi network in the break room and distribute homemade number-crunching apps to their coworkers on e-mail. They're hacking their iPhones right now to work with your company's mail servers. In short, they're walking, talking IT governance nightmares. But they could be your biggest assets, if you use them wisely. The reason superusers go rogue is usually frustration, says Marquis. "It's a symptom of the IT organization being unable to meet or even understand the needs of its customers," he says. "Otherwise, it wouldn't be happening." The solution? Put them to work.'"
Security

+ - Point and click Gmail hacking at Black Hat->

Submitted by
Tech.Luver
Tech.Luver writes "TGDaily reports, " I've just received an email that says "I like sheep", but it wasn't sent by my friend ? it was sent by a hacker posing as my friend. At the Black Hat security convention, Robert Graham, the CEO of errata security, surprised attendees by hijacking a Gmail session on camera and reading the victim's email. The attack is actually quite simple. First Graham needs to be able to sniff data packets and in our case the open Wi-Fi network at the convention fulfilled that requirement. He then ran Ferret to copy all the cookies flying through the air. Finally, Graham cloned those cookies into his browser ? in easy point-and-click fashion — with a home-grown tool called Hamster. ""
Link to Original Source
PC Games (Games)

+ - Id Goes Full Steam Ahead

Submitted by Dr. Eggman
Dr. Eggman (932300) writes "Today, quite wisper and rumors became fact as two FPS giants, Id and Valve joined forces to bring Id games back catalog to Valve's Steam. This marks a huge influx of old classics as well as opening up the possibility of bringing some of the newest, most anticipated Id games to Steam. Expect to hear more from Valve's appearance at Quakecon soon."

Brain off-line, please wait.

Working...