Ap coverage of hacker convention



Apnews has an article on the recent “hacker convention” in Las Vegas. In typical media fashion they paint with a broad brush to display it as “a no-mans land where customary adversaries, feds vs. digital mavericks are supposed to share ideas about making the internet safe.”

In reality, realize that the feds that were there are hackers as well in the purest sense of the word. I’ve found a good many “hackers” that discover and publicize security weaknesses do so to help prevent people from being scammed. There’s nothing illegal about discovering a security vulnerability, it’s what you do after you know about it that makes the difference. For instance, let’s say a business you know of leaves a key hidden in a location that has become public knowledge, if you use it to enter the premises you’ve broken the law, as it should be. If you use that information to contact them and say, “look I discovered this and suspect I’m not the only one,” then you may well have prevented someone from making that business an easy mark.

If it weren’t for the article (and the convention that gave the information), I wouldn’t be aware that old ATM’s are being sold on ebay for $1000 or so, and given “new” software and being used to steal bank card information. It pays to be aware of what the “bad guys” might be able to do, and from what I can see, the convention over the weekend was basically about sharing what they know in that area. If only the media were covering it from a different angle they might be asking “how do you identify a legit ATM?”

Related Posts

Blog Traffic Exchange Related Posts
  • Microsoft was aware of the WMF vulnerability "for years" Bugtraq has an interesting post which picks up on a note in Stephen Toulouse's latest entry on the WMF vulnerability. When I first read the post I was more interested in the way he was responding to allegations of the flaw being an intentional backdoor, but the above bugtraq post......
  • How to Remove Personal Security | Personal Security Removal Guide Personal Security is a rogue antivirus application that comes from the same (dreaded) family as the Cyber Security rogue. It usually installs on the users computer without the permission of the computer user. Once installed on the system it will then perform supposed scans finding lots of virus infected files......
  • Detecting Rootkits on a Linux machine Rootkits are a piece (or pieces) of software that someone can be used once a system is compromised to a) regain access to a system and b) remove traces of a compromise and c) many times hide itself. There are some tools for linux based systems that can be run......
Blog Traffic Exchange Related Websites
  • The Uncommon Benefits Of Social Media If you look at social media, you can see how it embodies all the qualities of the online business environment. Together with social media marketing, you can create incredible business relationships with your market at these social sites, and that will prove to be a very profitable move. Making use......
  • Credit Series: Payment History This is the second part of my Credit Series, where I explain the most important aspects of credit, credit reports, and credit scores. Each installment focuses on one factor influencing credit, tools to monitor and improve credit, or an explanation of a specific credit concept. The most significant factor in......
  • Jailbreaking Apple’s Mobile iProducts Get Easier As the popularity of the small Apple products (iPhone, iPad, iTouch) take off, they are drawing the attention of hackers.  Some hackers just want to access the OS so they can remove roadblocks for application customization and to add unauthorized tools and programs, while others might want to do damage or steal......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site