Latest Posts

Bd07d58f0d31d48d3764821d109bf165

Cyber Security Careers: What You Need To Know To Advance In The Security Field

October 23, 2014 Added by:Tripwire Inc

Skilled people make the difference in protecting sensitive data, so it’s more critical than ever that public and private sectors begin training and hiring cyber security professionals.

Comments  (2)

C940e50f90b9e73f42045c05d49c6e17

Cyber-Criminals Quickly Adopt Critical Flash Player Vulnerability

October 23, 2014 Added by:Malwarebytes

Keeping your computer up-to-date is probably one of the best pieces of advice one can give when it comes to online security.

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

New Zero-day in Microsoft OLE Being Exploited in Targeted Attacks

October 22, 2014 Added by:Pierluigi Paganini

Security experts at Google and McAfee have discovered a new zero-day vulnerability in Microsoft OLE being exploited in targeted attacks.

Comments  (0)

65be44ae7088566069cc3bef454174a7

6 Actions Businesses Should Take During Cyber Security Awareness Month

October 22, 2014 Added by:Rebecca Herold

October is National Cyber Security Awareness Month. It would seem the breaches announced virtually every day of this month so far were orchestrated to highlight the need for organizations to beef up their information security efforts and improve their controls.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Mana Tutorial: The Intelligent Rogue Wi-Fi Router

October 21, 2014 Added by:Dan Dieterle

Like other rogue Wi-Fi AP programs Mana creates a rogue AP device, but Mana does so much more.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Why Two-Factor Authentication is Too Important to Ignore

October 21, 2014 Added by:Patrick Oliver Graf

Going forward, we have to be prepared for the possibility that private information provided to a third party, like a merchant or a public agency, will be stolen.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Hacker Myths Debunked

October 20, 2014 Added by:Tripwire Inc

Ethical hacking can improve the security of various products, whereas malicious hacking seeks to undermine data integrity. It’s how people hack which shapes the nature of a particular incident.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

The ASV Process Is Broken – Part 1

October 20, 2014 Added by:PCI Guru

The topic of ASV scanning came up as usual at the 2014 PCI Community Meeting. The questions all seemed to revolve around how to obtain a passing scan.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Last Chance to Register for 2014 ICS Cyber Security Conference

October 17, 2014 Added by:InfosecIsland News

On Monday, October 20, 2014, attendees from around the world will gather in Atlanta, Georgia for the 2014 Industrial Control Systems (ICS) Cyber Security Conference.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The Chinese Truly are Attacking our Critical Infrastructure

October 17, 2014 Added by:Joe Weiss

Bob Radvanovsky from Infracritical took a similar approach and the results are astounding. He acquired some Ruggedom switches from E-Bay and set up a network emulating a well pumping station. Within 2 hours of connecting the systems, he was being attacked primarily from China.

Comments  (0)