Ap coverage of hacker convention



Apnews has an article on the recent “hacker convention” in Las Vegas. In typical media fashion they paint with a broad brush to display it as “a no-mans land where customary adversaries, feds vs. digital mavericks are supposed to share ideas about making the internet safe.”

In reality, realize that the feds that were there are hackers as well in the purest sense of the word. I’ve found a good many “hackers” that discover and publicize security weaknesses do so to help prevent people from being scammed. There’s nothing illegal about discovering a security vulnerability, it’s what you do after you know about it that makes the difference. For instance, let’s say a business you know of leaves a key hidden in a location that has become public knowledge, if you use it to enter the premises you’ve broken the law, as it should be. If you use that information to contact them and say, “look I discovered this and suspect I’m not the only one,” then you may well have prevented someone from making that business an easy mark.

If it weren’t for the article (and the convention that gave the information), I wouldn’t be aware that old ATM’s are being sold on ebay for $1000 or so, and given “new” software and being used to steal bank card information. It pays to be aware of what the “bad guys” might be able to do, and from what I can see, the convention over the weekend was basically about sharing what they know in that area. If only the media were covering it from a different angle they might be asking “how do you identify a legit ATM?”

Related Posts

Blog Traffic Exchange Related Posts
  • Detecting Rootkits on a Linux machine Rootkits are a piece (or pieces) of software that someone can be used once a system is compromised to a) regain access to a system and b) remove traces of a compromise and c) many times hide itself. There are some tools for linux based systems that can be run......
  • Phisher's getting sneakier The SecurityFix reports on this clever two-factor authentication phishing attempt. They were looking for Citibank Business customers and in addition to username password information they were looking to verify a supplied token. The bottom line is that phishers will look to find any way possible to social engineer you out......
  • Cyberextortion The New York Times online has an article on the rise of Cyberextortion. Businesses are usually targetted. That was true in the case of the focus of this article. Apparently the person in question used stolen Internet account information and "pirated wireless access" *(unsecured, open access points?), to threaten the......
Blog Traffic Exchange Related Websites
  • The Uncommon Benefits Of Social Media If you look at social media, you can see how it embodies all the qualities of the online business environment. Together with social media marketing, you can create incredible business relationships with your market at these social sites, and that will prove to be a very profitable move. Making use......
  • What Makes Article Advertising And Marketing One Of The Greatest Business Methods On-line Right Now Article advertising has turned out to be a invaluable useful resource and essential foundation for promoting a business on the Internet. In truth, it must be used to take care of the primary Internet article marketing review advertising method for a lot of causes: low cost, easiness to apply......
  • Credit Series: Payment History This is the second part of my Credit Series, where I explain the most important aspects of credit, credit reports, and credit scores. Each installment focuses on one factor influencing credit, tools to monitor and improve credit, or an explanation of a specific credit concept. The most significant factor in......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site