Wednesday, April 25, 2007

More on the MacBook Hack

There was some interesting press on the recent Mac hack at CanSecWest in Vancouver last week. The successful hacker was Dino Dai Zovi of Matasano.

Ryan Naraine interviewed Dino at the Vancouver conference, and had some other observations in another post on his blog Zero Day. Computer World also reported on the hack, which was from a QuickTime flaw. eWeek had an article on another Mac exploit, this one through Safari.

Matasano's blog has more details.

6 Comments:

Anonymous Anonymous said...

Hello Mr. Dubin,

We are writing an article on Mobile Security, and we seek your permission for using the following quote of yours in this article:

"To secure USBs, devices that have been approved and scanned prior to use by the IT department should be allowed. If possible, ensure they use encryption.

For securing laptops, use Network Access Control (NAC), software to scan laptops and remote desktops connected to the network to ensure they meet IT security standards and are sufficiently hardened."

Usually, our practice is to contact individual analysts/consultants via email and telephone for seeking permission for the quotes we use in our articles. We tried searching for your contact details on the Internet, but couldn't find any. Hence, we are writing in your blog. Hope this is fine.

Thanks,
Pravin

On behalf of:
Jim Zimmermann
Director of Research Products
Books24x7 (A SkillSoft company)

8:27 AM  
Anonymous Anonymous said...

To add to my last comment, we came across this quote in the following link:
http://searchsmb.techtarget.com/tip/0,289483,sid44_gci1198997,00.html


Thanks,
Pravin

8:29 AM  
Blogger The IT Security Guy said...

Pravin, You can use the quote, as long as you attribute it to TechTarget. Say that I made the comment in an article for TechTarget. -Joel

10:05 PM  
Anonymous Anonymous said...

Hello Mr. Dubin,

Thank you very much for granting us permission to use your quotes. We would definitely provide the necessary attribution as suggested by you.

We are working on several other AnalystPerspectives articles and would like to include some of your quotes in them. In this regard we might get back to you soon with these requests.

Best Regards,
Pravin Adik

On behalf of:
Jim Zimmermann
Director of Research Products
Books24x7 (A SkillSoft company)

12:26 PM  
Anonymous Anonymous said...

Hello Mr. Dubin,

Thanks for granting us permission in the past to quote from your publicly available material.

We are currently working on an AnalystPerspectives article titled ‘Best Practices for Email Security’ and would like to request permission to use some quotes from your publicly available material available at the following sources :

http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1257038,00.html

http://searchsmb.techtarget.com/originalContent/0,289142,sid44_gci1242184,00.html

A suggested by you in our earlier communication, we would provide necessary attibution to TechTarget.com.

We also would welcome any additional information or updated quotes that you could share with us.

Please note that we are running against tight deadlines to complete our articles and would appreciate hearing from you within three business days.

Thanks,
Pravin Adik

On behalf of:
Jim Zimmermann
Director of Research Products
Books24x7 (A SkillSoft company)

9:14 AM  
Blogger The IT Security Guy said...

Pravin, again, as before, you can use my quote, as long as you attribute it to TechTarget.

6:29 PM  

Post a Comment

Links to this post:

Create a Link

<< Home