from the which-one-am-i-again dept.
snydeq writes "First it's letting users manage their own PCs and now it's sanctioning the shadow IT projects they do on the down low: 'You probably know them. They're the ones who installed their own Wi-Fi network in the break room and distribute homemade number-crunching apps to their coworkers on e-mail. They're hacking their iPhones right now to work with your company's mail servers. In short, they're walking, talking IT governance nightmares. But they could be your biggest assets, if you use them wisely. The reason superusers go rogue is usually frustration, says Marquis. "It's a symptom of the IT organization being unable to meet or even understand the needs of its customers," he says. "Otherwise, it wouldn't be happening." The solution? Put them to work.'"
Tech.Luver writes: "TGDaily reports,
" I've just received an email that says "I like
sheep", but it wasn't sent by my friend ? it was sent by a hacker
posing as my friend. At the Black Hat security convention, Robert
Graham, the CEO of errata security, surprised attendees by hijacking a Gmail session on camera and reading the victim's email.
The attack is actually quite simple. First Graham needs to be able to sniff data packets and in our case the open Wi-Fi network at the
convention fulfilled that requirement. He then ran Ferret to copy all the cookies flying through the air. Finally, Graham cloned those cookies into his browser ? in easy point-and-click fashion — with a home-grown tool called Hamster. ""
Dr. Eggman writes: Today, quite wisper and rumors became fact as two FPS giants, Id and Valve joined forces to bring Id games back catalog to Valve's Steam. This marks a huge influx of old classics as well as opening up the possibility of bringing some of the newest, most anticipated Id games to Steam. Expect to hear more from Valve's appearance at Quakecon soon.