The 7th annual Techno Forensics Conference

/
The 7th annual Techno Forensics Conference will debut a track specifically devoted to Forensics industry professionals with highlighted focus on photo/video forensics and crime scene investigation and evidence collection. Joining together the Digital Forensic and Forensic communities reflects the crossover apparent today within a wide range of forensic and digital disciplines. This annual event brings together key stakeholders from industry, academia and government in an effort to strengthen this important technology, research, and communication bridge.

TakeDownCon 2011

/
About TakeDownCon Focused – All presentations for each event focuses on the chosen subject domains. Nothing else. Highly Technical - TakeDown Con insists that all presenters do live demonstrations or showcases. Speaks Binary Only – Ability to understand English is NOT enough here. You need to speak the Zeros and Ones. Knowledge Acquisition – By participating in the event, you will definitely learn something that is of value (unlike some others) Conducive Environment – You will not be squashed like ducks. Though we cannot guarantee everyone a seat, you will get to stand comfortably, at least.

ShmooCon 2011 – Security Conference

/
ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues. The first day is a single track of speed talks called One Track Mind. The next two days bring three tracks: Build It, Break It and Bring It On.

The Techno Forensics Conference 2011 – Call for Papers

/
The Techno Forensics Conference is all about digital forensics, evidence collection, crime scene documentation, and e-Discovery. Sessions are for industry professionals with some previous experience in these disciplines. Advanced level content and depth are a must.

Facebook to Collaborate with Amber Alert

/
Facebook has decided to collaborate with the AMBER Alert system, The National Center for Missing and Exploited Children and The U.S. Department of Justice to create 53 individual pages, one for each state including the District of Columbia, Puerto Rico and the U.S. Virgin Islands. Users will start receiving updates via their news feeds.

Introducing SAINT for MAC OS X

/
Vulnerability Scanning - Assess any target with an IPv4, IPv6, or URL with pre-defined policies for PCI, HIPAA, FISMA, and more. Identify CVE, OSVDB, IAVA, OVAL, and more. Penetration Testing - Exploit vulnerabilities to gain remote access. Run social engineering, phishing assessments, and more with the exploit tools suite.

Understanding What Threat Lies Beneath!

/
The average citizen is very lax with the security of their credit card information therefore may be giving a non-verbal invitations to credit card scammers. Understanding how your card can be compromised is the first step to protecting your credit. There are many ways to extract your sensitive data to enable someone to go on a “free” shopping spree.

How good is a product, when the support for it SUCKS?

/
Something I see get overlooked often in reviewing products, especially expensive security products, is support. I've done hundreds of product reviews over the years and numerous benchmarking comparisons to find the best software/hardware for the job. Early on I took for granted the type of support and the ease of access to qualified technical support staff, now it is my 2nd priority when investigating any product.