News from Black Hat USA, SpeechTEK,Defcon, LinuxWorld, and more

Latest Trade Show news

* FROM BLACK HAT USA CONFERENCE:

Microsoft looks for ways to combat Blue Pill, code-signing bypass, 08/07/06

After security researcher Joanna Rutkowska Thursday demonstrated how it’s possible to circumvent security in Microsoft’s Vista beta software and install a rootkit called Blue Pill, Microsoft said it intends to find ways to stop both potential threats ...

NAC, VoIP security draw questions at Black Hat, 08/07/06

At the Black Hat conference this week, security researchers drew attention to shortcomings in network access control and VoIP products, voicing criticisms that rang true to some enterprise network customers.

U.K. security guru lays into database vendors, 08/07/06

Noted security researcher David Litchfield has again panned the state of database security, revealing another clutch of vulnerabilities in the software of a major vendor.

Black Hat attendees: Protecting corporate assets is first priority, 08/04/06

Why do people throng to the Black Hat conference Las Vegas in August? To protect their key business assets from attackers, according to a survey conducted Wednesday at the show.

Unpatched flaw revealed in Cisco firewall, 08/04/06

Cisco just can't seem to make it through the Black Hat USA conference unscathed. On Wednesday a security researcher showed how an unpatched vulnerability in the company's PIX firewall appliances that could allow outside attackers to gain access ...

Juniper researcher Michael Lynn crashes Cisco party at Black Hat, 08/03/06

The invite-only party last night that Cisco held at a nightclub for Black Hat conference attendees was crashed by security researcher Michael Lynn, who last year was sued by Cisco for revealing a serious ...

Researcher discloses serious Xerox flaw, 08/03/06

Xerox is scrambling to update a security patch following the disclosure of a major security flaw in its WorkCenter multifunction printers.

Management apps could pose security risk, 08/03/06

Insecure coding and loose deployments of enterprise management applications could turn antivirus, patch management and systems management applications into powerful and malicious botnets, according to research presented at the Black Hat Briefings ...

FBI joins with industry to tackle ID theft, 08/02/06

The FBI is stepping up its fight against online fraud with a new initiative called Operation Identity Shield, according to a senior FBI official.

MacBook hit with wireless hack, 08/02/06

Security researchers David Maynor and Jon Ellch performed a digital drive-by Wednesday at the Black Hat USA conference. Their target: an Apple MacBook.

Researcher creates 'Net neutrality test, 08/02/06

A Seattle-based security researcher has devised a way to test for 'Net neutrality.

NAC solutions vulnerable to attack, 08/02/06

Network access control technology has been promoted as the savior of beleaguered enterprise networks, but enterprise IT managers who are hanging their hat on client health screening should think again, according to security expert Ofir Arkin of Insightix.

Black Hat Conference puts spotlight on NAC, Vista and rootkits, 07/31/06

The annual Black Hat Conference, which opens July 29 at Caesar’s Palace in Las Vegas, brings together security researchers and vendors in a freewheeling atmosphere aimed at laying bare the risks and vulnerabilities in IT products.

Cisco to be under scrutiny again, 07/24/06

Cisco's products will again come under scrutiny again at this year's Black Hat USA 2006 conference, which kicks off later this month in Las Vegas.

* FROM SPEECHTEK:

SpeechTEK show highlights the right way to use speech technology, 08/08/06

At the SpeechTEK conference going on this week in New York, attendees are hearing advice about how to deploy speech-based technologies without sacrificing customer service.

Microsoft adds IVR technology to VoIP hub, 08/08/06

Microsoft Tuesday added yet another piece to the IP-based backend it is creating for real-time communications when it announced that its voice recognition technology would be folded into its forthcoming VoIP hub.

* FROM DEFCON HACKER CONFERENCE:

Trojan malware takes a bite out of BlackBerry, 08/08/06

Security researcher Jesse D'Aguanno has developed what he bills as the first Trojan horse malware for Research in Motion's (RIM's) BlackBerry e-mail device.

* LINUXWORLD PREVIEW:

Linux event shows move to mainstream, 08/07/06

Conference agenda indicative of a maturing Linux.

* FROM HACKERS ON PLANET EARTH CONFERENCE:

Hacktivismo releases secure IM for dissidents, 07/24/06

People trying to communicate across oppressive national firewalls could be interested in ScatterChat, a secure IM application developed by an international group of hackers, human rights activists, lawyers and security experts.

* UPCOMING TRADE SHOWS (Aug., Sept., Oct.):

LinuxWorld San Francisco

Aug. 14-16, San Francisco

The MIS Audit Leadership Institute

Aug. 21-25, Boston

BMC UserWorld 2006, San Francisco

Aug. 29 – Sept. 1

The Security Standard

Sept. 6-7, Boston

Forrester Research Security Forum

Sept. 7-8, Atlanta

GridWorld 2006

Sept. 11-14, Washington D.C.

Fall 2006 VON

Sept. 11-14, Boston

Gartner IT and Software Asset Management Summit

Sept. 18-20, Lake Buena Vista, Fla.

Interop New York

Sept. 18-22, New York

IT Security World Conference & Expo 2006

Sept. 25-27, San Francisco

Demo Fall

Sept. 25-27, San Diego

Embedded Systems Conference

Sept. 25-28, Boston

NGN 2006

Sept. 26-30, Washington D.C.

Gartner Open Source Summit

Sept. 27-29, Phoenix, Ariz.

Gartner Symposium/ITxpo/US/Fall

Oct. 8 - 13, Orlando

Fall Microprocessor Forum. Program

Oct. 9 – 11, San Jose

Business Objects Global Summit

Oct. 15-17, Orlando, Fla.

MPLS 2006 Conference

Oct 15-18, Washington D.C.

Oracle OpenWorld

Oct. 22-26, San Francisco

* FREE NETWORK WORLD SEMINARS:

IT Roadmap:

Dallas, Sept. 13

Bay Area, Nov. 30

It's where you'll hear IT strategies delivered direct to you from Network World editors six months ahead of outsiders even knowing about it. Where you can meet personally, one-on-one, with an IT all-star to discuss how coming technology will reshape your enterprise. Where you can accomplish a year's worth of vendor analysis among more than two dozen solution providers all in one day.

Related:

Copyright © 2006 IDG Communications, Inc.

The 10 most powerful companies in enterprise networking 2022