Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/10/2008
07:55 AM
50%
50%

Hacking and the Academy Awards

Fortify Software documentary illustrates impact of cybercrime on consumers, business

5:55 PM -- Is hacking becoming, well, telegenic? First we saw CourtTV's "Tiger Team" reality TV program (see The Perfect Jewelry Heist and Pen Testing Goes Reality TV), and now the upcoming screening (yes, an actual screening) of a documentary called "The New Face of Cybercrime,” filmed by Academy Award-nominated filmmaker Frederic Golding.

Fortify Software, which hired Golding for the production, has released a trailer on YouTube of the approximately 30-minute film, which looks at cybercrime's impact on consumers and businesses.

Judging from the trailer, it's a slick production, with some impressive industry, government, and business personalities weighing in on the cybercrime evolution, including firewall pioneer Marcus Ranum; James Routh, CISO of The Depository Trust & Clearing Corp.; Air Force Col. Jeff Salyards, director of the Defense Computer Forensics Laboratory; and Mike Ullman, chairman and CEO of JC Penney.

Cigital CTO Gary McGraw is also interviewed in the film, and the trailer includes RSnake (aka Robert Hansen, founder of SecTheory) showing how he can inject "anything" he wants onto the domains.aol.com page due to a cross-site scripting flaw on it.

"It's amazing the number of folks we were able to get to open up about this [cybercrime] topic," says Clark Newby, vice president of marketing for Fortify. "The story had not been all told together and put in front of folks... so that people can really get an understanding of what's going on inside the hacker ecology."

Newby says no bad guys appear in the film, but he hinted that some may have served as off-camera sources. "They're not in the film. I'll just say that," he says.

(Neither is our telegenic site editor, Tim Wilson, who filmed a segment with Golding that apparently ended up on the cutting-room floor. Star quality is tough to define.)

There are no plans for a Hollywood premiere of "The New Face of Cybercrime." Fortify will post portions of the film on its Website, as well as provide copies to its customers and business partners.

"Our goal is to educate folks about the threat and challenges," Newby says. The invitation-only screenings will be held in San Francisco, New York, and London.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • Fortify Software Inc.
  • Cigital Inc.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Threaded  |  Newest First  |  Oldest First
    Florida Town Pays $600K to Ransomware Operators
    Curtis Franklin Jr., Senior Editor at Dark Reading,  6/20/2019
    Pledges to Not Pay Ransomware Hit Reality
    Robert Lemos, Contributing Writer,  6/21/2019
    AWS CISO Talks Risk Reduction, Development, Recruitment
    Kelly Sheridan, Staff Editor, Dark Reading,  6/25/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    Building and Managing an IT Security Operations Program
    As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
    Flash Poll
    The State of IT Operations and Cybersecurity Operations
    The State of IT Operations and Cybersecurity Operations
    Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-1619
    PUBLISHED: 2019-06-27
    A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. The vulnerability is due to improper session ...
    CVE-2019-1620
    PUBLISHED: 2019-06-27
    A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to upload arbitrary files on an affected device. The vulnerability is due to incorrect permission settings in affected DCNM software. An attacker could ex...
    CVE-2019-1621
    PUBLISHED: 2019-06-27
    A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to gain access to sensitive files on an affected device. The vulnerability is due to incorrect permissions settings on affected DCNM software. An attacker...
    CVE-2019-1622
    PUBLISHED: 2019-06-27
    A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to retrieve sensitive information from an affected device. The vulnerability is due to improper access controls for certain URLs on affected DCNM software...
    CVE-2019-10133
    PUBLISHED: 2019-06-26
    A flaw was found in Moodle before 3.7, 3.6.4, 3.5.6, 3.4.9 and 3.1.18. The form to upload cohorts contained a redirect field, which was not restricted to internal URLs.