Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

07:55 AM

Hacking and the Academy Awards

Fortify Software documentary illustrates impact of cybercrime on consumers, business

5:55 PM -- Is hacking becoming, well, telegenic? First we saw CourtTV's "Tiger Team" reality TV program (see The Perfect Jewelry Heist and Pen Testing Goes Reality TV), and now the upcoming screening (yes, an actual screening) of a documentary called "The New Face of Cybercrime,” filmed by Academy Award-nominated filmmaker Frederic Golding.

Fortify Software, which hired Golding for the production, has released a trailer on YouTube of the approximately 30-minute film, which looks at cybercrime's impact on consumers and businesses.

Judging from the trailer, it's a slick production, with some impressive industry, government, and business personalities weighing in on the cybercrime evolution, including firewall pioneer Marcus Ranum; James Routh, CISO of The Depository Trust & Clearing Corp.; Air Force Col. Jeff Salyards, director of the Defense Computer Forensics Laboratory; and Mike Ullman, chairman and CEO of JC Penney.

Cigital CTO Gary McGraw is also interviewed in the film, and the trailer includes RSnake (aka Robert Hansen, founder of SecTheory) showing how he can inject "anything" he wants onto the domains.aol.com page due to a cross-site scripting flaw on it.

"It's amazing the number of folks we were able to get to open up about this [cybercrime] topic," says Clark Newby, vice president of marketing for Fortify. "The story had not been all told together and put in front of folks... so that people can really get an understanding of what's going on inside the hacker ecology."

Newby says no bad guys appear in the film, but he hinted that some may have served as off-camera sources. "They're not in the film. I'll just say that," he says.

(Neither is our telegenic site editor, Tim Wilson, who filmed a segment with Golding that apparently ended up on the cutting-room floor. Star quality is tough to define.)

There are no plans for a Hollywood premiere of "The New Face of Cybercrime." Fortify will post portions of the film on its Website, as well as provide copies to its customers and business partners.

"Our goal is to educate folks about the threat and challenges," Newby says. The invitation-only screenings will be held in San Francisco, New York, and London.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • Fortify Software Inc.
  • Cigital Inc.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Ransomware Is Not the Problem
    Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
    How Can I Test the Security of My Home-Office Employees' Routers?
    John Bock, Senior Research Scientist,  6/7/2021
    New Ransomware Group Claiming Connection to REvil Gang Surfaces
    Jai Vijayan, Contributing Writer,  6/10/2021
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    The State of Cybersecurity Incident Response
    In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
    Flash Poll
    How Enterprises are Developing Secure Applications
    How Enterprises are Developing Secure Applications
    Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2021-06-21
    ** DISPUTED ** Manuskript through 0.12.0 allows remote attackers to execute arbitrary code via a crafted settings.pickle file in a project file, because there is insecure deserialization via the pickle.load() function in settings.py. NOTE: the vendor's position is that the product is not intended fo...
    PUBLISHED: 2021-06-21
    Joomla! Core is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauth...
    PUBLISHED: 2021-06-21
    Joomla! Core is prone to a session fixation vulnerability. An attacker may leverage this issue to hijack an arbitrary session and gain access to sensitive information, which may help in launching further attacks. Joomla! Core versions 1.5.x ranging from 1.5.0 and up to and including 1.5.15 are vulne...
    PUBLISHED: 2021-06-21
    Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise restricted actions and subsequently retrieve password reset tokens from the database through an already existing SQL injection vector. Joomla! Core versions 1.5.x ranging from 1.5...
    PUBLISHED: 2021-06-21
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.