Feeds

Infosec bod reports ONGOING ATTACK at RSA securo-confab

Conference staffer blames device config snafu

Next gen security for virtualised datacentres

RSA Europe 2013 Problems logging into VPN networks left delegates even more twitchy than normal at the RSA Conference Europe this week.

The conference, staged in London, for the previous six years, has moved to Amsterdam and the massive RAI Conference venue this year. The venue also stages the Cropworld conference, which attracted a group of around 200 protesters against Monsanto.

One security specialist and penetration tester noticed problems at the both the conference venue and hotel that he tentatively blamed on someone running a man in the middle attack. SSL connections were also affected.

El Reg sought a second opinion on the matter from an independent security expert who said this was a symptom of the proxy service in play.

MWR was far from the only delegate to notice problems logging into VPNs. So what was going on? Was it the NSA (again)? Was it a crypto-anarchist wing of the anti-Monsanto hippies?

We relayed concerns abut the Wi-Fi to the efficient PR team at the conference, who asked techies at the venue to look into the matter. A preliminary investigation found that "old certificates" might be behind the reported glitches.

Soon after, we were told the problem had been pinned down to a misconfigured network device. "It's a non-issue," a RSA staffer told us. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?