Feeds

ATM hack presentation ditched after legal threats

Out of order

Top 5 reasons to deploy VMware with Tegile

A planned presentation about ATM security at the Hack in the Box conference in Amsterdam last week was cancelled following legal pressure from vendors.

Italian ethical hacker Raoul Chiesa intended to explain how vulnerabilities and security shortcomings that that cyber criminals were using to break into ATMs as part of his Underground Economy presentation at Hack in the Box. However, this talk was cancelled at the last minute in favour of a presentation on Side Channel Analysis on Embedded Systems by Job de Haas, Softpedia reports.

Oddly Chiesa had made the cancelled presentation at other security conferences without incident. The slides were even available online. The talk focused on security flaws that have been well understood among banking security experts, if not among the general public, for years. ENISA report, ATM Crime: Overview of the European situation and golden rules on how to avoid it, and published in September 2009, draws heavily from Chiesa's research.

Chiesa advises both ENISA and the Global Crimes Unit of the United Nations Interregional Crime & Justice Research Institute (UNICRI), as illustrated here.

It's not the first time ATM suppliers have taken action to block presentations on ATM security flaws at security conferences. Most famously, a presentation of ATM security by Barnaby Jack was pulled from last year's Black Hat, only to be re-instated for next month's show, a development at least eased if not enable when Jack left the employment of Juniper Networks to work for IOActive Labs.

It remains to be seen whether ATM vendors will once again move to block Jack's "Jackpotting" presentation this year. The software-based hack involves fooling ATM machines into spewing out more money than requested, an approach Jack himself compares to the cash machines hack carried out by John Connor in Terminator 2, AFP reports. ®

Beginner's guide to SSL certificates

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.