More on the MacBook Hack
There was some interesting press on the recent Mac hack at CanSecWest in Vancouver last week. The successful hacker was Dino Dai Zovi of Matasano.
Ryan Naraine interviewed Dino at the Vancouver conference, and had some other observations in another post on his blog Zero Day. Computer World also reported on the hack, which was from a QuickTime flaw. eWeek had an article on another Mac exploit, this one through Safari.
Matasano's blog has more details.
Ryan Naraine interviewed Dino at the Vancouver conference, and had some other observations in another post on his blog Zero Day. Computer World also reported on the hack, which was from a QuickTime flaw. eWeek had an article on another Mac exploit, this one through Safari.
Matasano's blog has more details.
6 Comments:
Hello Mr. Dubin,
We are writing an article on Mobile Security, and we seek your permission for using the following quote of yours in this article:
"To secure USBs, devices that have been approved and scanned prior to use by the IT department should be allowed. If possible, ensure they use encryption.
For securing laptops, use Network Access Control (NAC), software to scan laptops and remote desktops connected to the network to ensure they meet IT security standards and are sufficiently hardened."
Usually, our practice is to contact individual analysts/consultants via email and telephone for seeking permission for the quotes we use in our articles. We tried searching for your contact details on the Internet, but couldn't find any. Hence, we are writing in your blog. Hope this is fine.
Thanks,
Pravin
On behalf of:
Jim Zimmermann
Director of Research Products
Books24x7 (A SkillSoft company)
To add to my last comment, we came across this quote in the following link:
http://searchsmb.techtarget.com/tip/0,289483,sid44_gci1198997,00.html
Thanks,
Pravin
Pravin, You can use the quote, as long as you attribute it to TechTarget. Say that I made the comment in an article for TechTarget. -Joel
Hello Mr. Dubin,
Thank you very much for granting us permission to use your quotes. We would definitely provide the necessary attribution as suggested by you.
We are working on several other AnalystPerspectives articles and would like to include some of your quotes in them. In this regard we might get back to you soon with these requests.
Best Regards,
Pravin Adik
On behalf of:
Jim Zimmermann
Director of Research Products
Books24x7 (A SkillSoft company)
Hello Mr. Dubin,
Thanks for granting us permission in the past to quote from your publicly available material.
We are currently working on an AnalystPerspectives article titled ‘Best Practices for Email Security’ and would like to request permission to use some quotes from your publicly available material available at the following sources :
http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1257038,00.html
http://searchsmb.techtarget.com/originalContent/0,289142,sid44_gci1242184,00.html
A suggested by you in our earlier communication, we would provide necessary attibution to TechTarget.com.
We also would welcome any additional information or updated quotes that you could share with us.
Please note that we are running against tight deadlines to complete our articles and would appreciate hearing from you within three business days.
Thanks,
Pravin Adik
On behalf of:
Jim Zimmermann
Director of Research Products
Books24x7 (A SkillSoft company)
Pravin, again, as before, you can use my quote, as long as you attribute it to TechTarget.
Post a Comment
<< Home