Latest Posts

Bd07d58f0d31d48d3764821d109bf165

Hacker Myths Debunked

October 20, 2014 Added by:Tripwire Inc

Ethical hacking can improve the security of various products, whereas malicious hacking seeks to undermine data integrity. It’s how people hack which shapes the nature of a particular incident.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

The ASV Process Is Broken – Part 1

October 20, 2014 Added by:PCI Guru

The topic of ASV scanning came up as usual at the 2014 PCI Community Meeting. The questions all seemed to revolve around how to obtain a passing scan.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Last Chance to Register for 2014 ICS Cyber Security Conference

October 17, 2014 Added by:InfosecIsland News

On Monday, October 20, 2014, attendees from around the world will gather in Atlanta, Georgia for the 2014 Industrial Control Systems (ICS) Cyber Security Conference.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The Chinese Truly are Attacking our Critical Infrastructure

October 17, 2014 Added by:Joe Weiss

Bob Radvanovsky from Infracritical took a similar approach and the results are astounding. He acquired some Ruggedom switches from E-Bay and set up a network emulating a well pumping station. Within 2 hours of connecting the systems, he was being attacked primarily from China.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Acting on MSSP Alerts

October 16, 2014 Added by:Anton Chuvakin

Security incidents call for an immediate incident response (by definition), while alerts need to be reviewed via an alert triage process in order to decide whether they indicate an incident, a minor “trouble” to be resolved immediately, a false alarm or a cause to change the alerting rules in order to not see it ever again.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

When Remote Access Becomes Your Enemy

October 16, 2014 Added by:Patrick Oliver Graf

As convenient as it would be for businesses to have all their IT service providers working on-site, just down the hall, that’s not always possible.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Security Companies Hit Hikit Backdoor Used by APT Group

October 16, 2014 Added by:Brian Prince

A coordinated effort by security companies has struck a blow against malware tools used by a cyber-espionage group known as Hidden Lynx.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

Spying Flashlight Apps Reveal User Inattentiveness to Cyber Security

October 15, 2014 Added by:Tripwire Inc

What we often don’t realize, however, is the amount of personal information our phones actually store and how easily accessible we make this data, not only for ourselves, but for others, too. A recent Android study proves many of us are likely not careful enough.

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

Introducing the Shoulders of InfoSec Project

October 15, 2014 Added by:Jack Daniel

In information security we have a very bad habit of ignoring the past; many times it isn’t even a failure to remember, it is a failure to ever have known who and what came before.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

SandWorm Hacking Team Exploited 0-day Against NATO and Other Government Entities

October 14, 2014 Added by:Pierluigi Paganini

According to a new report issued by the cyber security firm iSIGHT Partners, a group of Russian hackers has been exploiting a previously unknown flaw in Microsoft’s Windows operating system to spy on NATO, the Ukrainian government, a U.S. university researcher and many other entities.

Comments  (0)