Digital Arms Dealer

Greenberg, Andy
October 2010
Forbes Asia;Oct2010, Vol. 6 Issue 12, p74
The article reports on the plan of NSS Labs to launch an online platform that will allow researchers to buy and sell hacking exploits on an open marketplace known as Exploit Hub. On this platform, security researchers will be able to upload hacking techniques, name their price and sell work that has been profitable only through the cybercriminal black market. Moreover, the security auditors will be able to download those hacks en masse to perform test that suss out vulnerabilities.


Related Articles

  • COMPUTER SECURITY UPDATE.  // Computer Security Update;Aug2010, Vol. 11 Issue 8, p1 

    The article offers information on various issues related to computer security. It mentions that the Trend Micro Inc. (TM) was given a recommend rating by NSS Labs because of its TM OfficeScan product with five hours time-to-block ability against other computer security products. It states that...

  • Introduction to the Economics of Cybersecurity. BAUER, Johannes M.; VAN EETEN, Michel // Communications & Strategies;2011 1st Quarter, Issue 81, p13 

    The article discusses cyber crime and the means to combat it as of March 2011. It states that computer connectivity is used in all aspects of daily life and industry, and cyber crime has kept pace with their growing use. It reports that early forms of cyber crime were used by hackers to glorify...

  • Computer Hacking Forensics Investigators: Reducing Security Breaches. Bavisi, Jay // Certification Magazine;Mar2006, Vol. 8 Issue 3, p36 

    Discusses the role of computer hacking forensics investigators in reducing computer security breaches. Challenges facing businesses relating to computer security; Reasons behind the need for forensics investigators; Information on the Computer-Hacking Forensics Investigators training program...

  • Letters. Wright, Scott // SC Magazine: For IT Security Professionals (15476693);Mar2011, Vol. 22 Issue 3, p19 

    Several letters to the editor are presented in response to the online articles about the best practices in training for security awareness and another on the hacking of a security firm by the group, Anonymous.

  • Bridging the Gap. Sims, Stephen // Information Security;Nov2008 Supplement, p10 

    The article explores the world of hacking. Several hackers depend on client-side attacks, social engineering and physical security vulnerabilities with traditional objective of information exposure and account harvesting. Client-side attacks rely on the victim enabling the attack to happen. The...

  • Is retaliation an answer to cyber attacks? Messmer, Ellen // Network World;1/24/2011, Vol. 28 Issue 2, p1 

    The article discusses the effectiveness of counterinsurgency to slow the threat of cyber attacks. According to Laurent Oudot, founder of TEHTRI-Security, if an attacker has taken control of a corporate machine, it is logical to counterstrike to determine the desire of the attacker and to find a...

  • Defend Your (Virtual) Home. Regnier, Pat; Sahadi, Jeanne // Money;Dec2006, Vol. 35 Issue 12, p122 

    The article discusses the problems of hackers and how to protect one's computer from them. Every time someone is online, the computer is open to being targeted. The author offers several tips to prevent online attacks. Among the suggestions, it is recommended that one keep security software...

  • Security Analysis and Improvements of a Password-Based Mutual Authentication Scheme with Session Key Agreement. Younghwa An; Youngdo Joo // International Journal of Security & Its Applications;Jan2013, Vol. 7 Issue 1, p85 

    Password-based authentication schemes have been widely adopted to protect resources from unauthorized access. In 2008, Chang-Lee proposed a friendly password-based mutual authentication scheme to avoid the security weaknesses of Wu-Chieu's scheme. In this paper, we demonstrate that Chang-Lee's...

  • What's Next. Freedman, David H. // Inc.;Aug2005, Vol. 27 Issue 8, p57 

    Focuses on the implication of the problems concerning computer security for business enterprises. Background on computers systems hacked in 1992; Failure of firewall, intrusion detection systems and antivirus software to protect computer data from hackers; Susceptibility of the Internet to...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics