sábado, 23 de fevereiro de 2008

Vulnerabilidades no Mac OS X

Acompanhe as vulnerabilidades no Mac OS X no site da Secunia: http://secunia.com/product/96/?task=statistics_2008


Hacker group releases automated 'Google hacking' tool

http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9064238&source=rss_news10

Empresa cria software para destruir dados de laptops

A empresa Virtuity criou um sistema para destruir os dados contidos em laptops (notebooks) em caso de furto, roubou ou perad. A notícia completa pode ser lida no site 

sexta-feira, 22 de fevereiro de 2008

A Method for Critical Data Theft - Part II

Vejam as respostas com soluções para a quebra de criptografia baseada no conteúdo da memória. Leia no artigo da Security Magazine.

Wiretapping Made Easy

Segundo os pesquisadores David Hulton e Steve Muller, eles desenvolveram um método de capturar e quebrar a criptografia de conversas em celulares. O artigo completo (em inglês) pode ser lido em http://www.forbes.com/2008/02/21/cellular-spying-decryption-tech-security-cx_ag_0221cellular_print.html
 

A Method for Critical Data Theft

Pesquisadores da Universidade de Princeton quebraram sistemas de criptografia congelando chips de memória, o que permitiu ler seu conteúdo.
 
O artigo completo (em PDF) pode ser obtido aqui.

quarta-feira, 20 de fevereiro de 2008

Chip em cartões de crédito pode ser obrigatório

Veja a notícia completa aqui.

quarta-feira, 6 de fevereiro de 2008

Consider an ISACA Certification

Have you considered becoming certified as a CISA or CISM? Being a proud credential holder myself, I thought you might be interested in joining the ranks of more than 55,000 audit, control and security professionals who already hold the CISA designation, and more than 7,000 information security management professionals who are CISMs. As you already know, certification makes you highly desirable to potential employers and is becoming a requirement in many parts of the world.

The next certification exams are being offered by ISACA on 14 June 2008, and the early registration deadline is fast approaching on 13 February. Read the information below and consider certification today!

** Save US $50.00 by registering early AND US $50 for registering online! **

  Early registration pricing - all discounts reflected in quoted prices
  -------------------------------------------------------------------------
  Online registration:               Member $325.00  Nonmember $455.00
  Fax or mail registration:          Member $375.00  Nonmember $505.00

Secure your place today. Register online before the deadline to avoid the last minute "rush" at www.isaca.org/examreg.

2008 CISA and CISM June Exam Dates:
  Early registration deadline: 13 February 2008
  Final registration deadline: 9 April 2008
  Exams given worldwide on: 14 June 2008

This year, the Certified Information Systems Auditor™ (CISA®) credential turns thirty years old. With a growing demand for professionals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organizations around the world. More than 55,000 audit, control and security professionals have achieved this globally accepted standard since 1978.

In 2002, ISACA introduced CISM® (Certified Information Security Manager®), a groundbreaking credential specifically designed for information security professionals who manage an information security function of an enterprise or have information security management responsibilities. ISACA has certified more than 7,000 CISMs to date. For more information about CISA or CISM, please visit the ISACA web site at www.isaca.org/certification.

ISACA's newest credential, Certified in the Governance of Enterprise IT™ (CGEIT™), is now accepting grandfathering applications. It is designed for professionals who have management, advisory, and/or assurance responsibilities relating to the governance of IT. For more information on CGEIT and the grandfathering provision, please visit www.isaca.org/cgeit.

Note: The online registration process accepts payments and is the preferred method for submitting exam registrations. Due to very heavy registration volume as the early deadline approaches, we ask for your patience when submitting this information. To contact the certification department, call +1.847.660.5660; or e-mail certification@isaca.org.

About ISACA

With more than 65,000 membersin 140 countries, ISACA (www.isaca.org) is a recognized worldwide leader in IT governance, control, security and assurance. Founded in 1969, ISACA sponsors international conferences; publishes the Information Systems Control Journal; and develops international information systems auditing and control standards. It also administers the globally respected Certified Information Systems Auditor (CISA) designation, earned by more than 55,000 professionals since 1978; the Certified Information Security Manager (CISM) designation, earned by 7,000 professionals since 2002; and the new Certified in the Governance of Enterprise IT (CGEIT) designation.