Ap coverage of hacker convention



Apnews has an article on the recent “hacker convention” in Las Vegas. In typical media fashion they paint with a broad brush to display it as “a no-mans land where customary adversaries, feds vs. digital mavericks are supposed to share ideas about making the internet safe.”

In reality, realize that the feds that were there are hackers as well in the purest sense of the word. I’ve found a good many “hackers” that discover and publicize security weaknesses do so to help prevent people from being scammed. There’s nothing illegal about discovering a security vulnerability, it’s what you do after you know about it that makes the difference. For instance, let’s say a business you know of leaves a key hidden in a location that has become public knowledge, if you use it to enter the premises you’ve broken the law, as it should be. If you use that information to contact them and say, “look I discovered this and suspect I’m not the only one,” then you may well have prevented someone from making that business an easy mark.

If it weren’t for the article (and the convention that gave the information), I wouldn’t be aware that old ATM’s are being sold on ebay for $1000 or so, and given “new” software and being used to steal bank card information. It pays to be aware of what the “bad guys” might be able to do, and from what I can see, the convention over the weekend was basically about sharing what they know in that area. If only the media were covering it from a different angle they might be asking “how do you identify a legit ATM?”

Related Posts

Blog Traffic Exchange Related Posts
  • A couple warnings related to fake security sites Sunbelt has this warning about yet another fake security site. This one is laid out a bit different than the others we've seen in recent days. It's not quite the same spoof of the Windows Security Center, but it makes use of Microsoft's security logo. (And it does say Security......
  • Microsoft was aware of the WMF vulnerability "for years" Bugtraq has an interesting post which picks up on a note in Stephen Toulouse's latest entry on the WMF vulnerability. When I first read the post I was more interested in the way he was responding to allegations of the flaw being an intentional backdoor, but the above bugtraq post......
  • Network Security guide for the home or small business network - Part 9 - Know your network Once more into the breech... Ok you've taken account of the software and services on your pc. The next thing we need to talk about is knowing your network. Do you have any wireless access points? Not sure? Print servers? How many pcs? Are any of them portables? Public access?......
Blog Traffic Exchange Related Websites
  • Search History - Today And Tomorrow It could sound a bit scary but every single stroke of my keyboard is recorded by the laptop or computer memory. You had been looking for particular info on the web. In several days whenever you required to check out the similar pages again, to your utter dismay, you......
  • Jailbreaking Apple’s Mobile iProducts Get Easier As the popularity of the small Apple products (iPhone, iPad, iTouch) take off, they are drawing the attention of hackers.  Some hackers just want to access the OS so they can remove roadblocks for application customization and to add unauthorized tools and programs, while others might want to do damage or steal......
  • SecurityOrb’s Top 5 Cyber Security Threat Predictions for 2011 2010 was an attention-grabbing year in the information security industry.  We saw some interesting things such as Google alleged hack by China, Wikileaks and the issues with insider threat and hacktivism, Stuxnet advanced malware implementation and social networking site vulnerabilities as well as our share of zero-day attacks to name......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site