Today security industry is as interesting as never before and people are into it for different reasons. Some of us are into it because of endless opportunity to learn, some are because that special knowledge can gain them fame, then there are people with malicious intentions, and finally there are people doing it for cash.
While its not our job to tell you who is bad and who is not we often think about future of this “business”. Researching takes up time, and time is cash, it also require knowledge and experience.
But is the talent and as we called it before — special knowledge — really required in security?
Zone-h is starting the new mirror that will cover the whole Arab community: arab.zone-h.org. It will be officially announced at the 3. ICT Security Forum in Damascus, Syria, that will happen on July 30th-31-th, 2007.
Zone-H will start to bring it’s training programs to the Arab community. The first training sessions will be soon announced, and will be held in Damascus in cooperation with Platinum Inc..
Those who are interested in collaborating with Zone-H editorial staff can write to the worldwide mirror manager minor () , Arabic mirror managers Bassel Hamideh and Iyadh Houshi or Halfmoon () , the coordinator of Zone-H international programs and business opportunities.
Subject: cyber crime
Length article: 25 lines sheet A4 format
Digital article: word
Publication Area: IT SEC News
Author: first name last name /nick name
Policy Zone-H In order to send an article it is necessary be a registered user. Each article shall be controlled by Zone-H staff, it can be approved/not approved; offensive sentences, photos, comments shall also be cancelled. In case of substantial changes within the article received, zone-h staff undertakes to share with the author the updating of article for its next release. It is also necessary to indicate the source of the information (e.g. extract/cited by..) even if partial.If the article is interesting, the zone-h staff shall ask the author for a disclaimer.It is understood that:
- Article Rights shall be granted for free, only the publication of the name/nickname author’s shall be guaranteed
- Zone-h can use the Article for any reproduction and/or reprint in any form and technology
- All contents and photographs, which will be provided, must be lawfully used, as the ownership and the contents must not infringe the rights of third parties.
Sending the Article to firstname.lastname@example.org implies the acceptance of above conditions.
iPhone from Apple is for many a masterpiece. It has WiFi, screen that turns when you turn the phone. It has so many wonderful features, that also Steve Wozniak would make it to his primary number, and really, on first day were approx. 200 000 pieces sold.
But soon after releasing iPhone to public, many researchers tried to make their own research, one disassembled it, another one smashed the new iPhone against the ground. And, there are lot of researchers that took a look on operating system.
A revolution in the way security research is handled and reported has occurred! WSLabi (http://www.wslabi.com), a neutral vendor independent Swiss laboratory, has launched a new international security research exchange.
This exchange will create a portal where researchers, security vendors and software companies can interact in an open market to enable researcher’s to obtain the correct value for their findings. The exchange will become a global database of every IT security research ever found.