Latest Blog Posts

C6dd57cb9806eadc9f7915a90d91aa92

Forensics for Network, Internet, and Cloud Computing

September 06, 2011 Added by:Tony Campbell

A number of chapters had a very long and complete reference section, while a few chapters had no reference section at all, yet it was obvious that they required a reference section. And poor screenshots and lack of references seems like laziness on behalf of the author and publisher...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

IT Skills and Certifications Paying Less Each Quarter

September 06, 2011 Added by:Bill Gerneglia

The pay premiums for 237 IT certifications continued their terrible performance for a fourth second straight quarter. This trend results in an overall loss in market value of nearly 2 percent for the quarter, according to the Foote Partners report...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Preliminary Report on Bogus DigiNotar Certificates

September 06, 2011 Added by:Headlines

"A number of servers were compromised. The hackers have obtained administrative rights to the outside webservers, the CA server Relaties-CA and also to Public-CA. Traces of hacker activity started on June 17th and ended on July 22nd..."

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

China: What Evil Lurks Within?

September 06, 2011 Added by:Joel Harding

Eli Lake of the Washington Post is again using our fear of the unknown against us. In his article, he brings up Huawei's attempts to operate as, well, a business. Huawei is accused, as a high tech telecommunications company, of attempting to get equipment onto the US 4G cell network...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

DHS Issues Security Bulletin on Anonymous Hackers

September 06, 2011 Added by:Headlines

"These attacks have the potential to result in serious harm, particularly to Law Enforcement... Also, this assessment does not take into account the possibility of a higher-level actor providing Anonymous, LulzSec or a similar group with more advanced capabilities..."

Comments  (0)

4ff49873e3fed9a24adf0d37ae00b780

The Top Three Hacker Movies Of All Time...

September 06, 2011 Added by:Lee Munson

The movies that hackers love to watch: These movies show the genre in an enlightening way and anyone who makes a living slanging code on the computer can relate to them. Some are classics because of how realistic they are while others are classics because of the cheesy value...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Sony Corporation Taps Philip Reitinger as First CISO

September 06, 2011 Added by:Headlines

The Sony breach saga began in April when the PlayStation network servers had been hacked, exposing the records of more than 70 million customers. Sony then discovered that the Online Entertainment network had also been compromised, exposing another 25 million records...

Comments  (0)

8b5e0b54dfecaa052afa016cd32b9837

Security: What Was Old is New Again

September 06, 2011 Added by:Craig S Wright

So, when all is said and done, we have not really changed much as a species. We love to believe that we as a generation are forging something new and facing problems that no other has faced before, but in reality, the analogy remains as it is always likely to remain. Change is the only constant...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

California's "Sextortion" Hacker Sentenced to Prison

September 06, 2011 Added by:Headlines

In addition to stealing financial information, Mijangos “read victims’ e-mails and IMs, watched them through their webcams, and listened to them through the microphones on their computers. Often, he then used the information he obtained to play psychological games with his victims...”

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Information Security as the Doctor of the Enterprise

September 05, 2011 Added by:Robb Reck

Aren’t we in information security playing exactly the same role in our organizations that our doctor’s play in our healthcare? We evaluate, diagnose, and treat our patients, just like our doctors do for us. But our evaluations are called risk assessments instead of checkups...

Comments  (1)

5e402abc3fedaf8927900f014ccc031f

Is Social Media Eroding Our Privacy?

September 05, 2011 Added by:Allan Pratt, MBA

As we have become more and more absorbed in social media, when was the point that we stopped caring about our confidential information? When did we lose control of our privacy? Is the simple solution to blame Mark Zuckerberg? Or should we blame companies who want access to our data?

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

How to Engage Employees in Compliance

September 05, 2011 Added by:Thomas Fox

A compliance professional should see him or herself as a catalyst for problem solving. As a lawyer I understand that you are required to know law and compliance requirements. But remember - it is OK not to know everything. That is the whole point of collaboration...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Hidden Wiki: Layers of The Onion Router Networks

September 04, 2011 Added by:Infosec Island Admin

Someone recently asked if I had ever heard of “The Hidden Wiki” They said they had just perused an ad that purported to offer “hired killer” services. This person immediately thought it was just a joke, but it turns out that hired killers are just the tip of the iceberg within TOR...

Comments  (5)

D13f77e036666dbd8f93bf5895f47703

On Car Hacking Attacks

September 04, 2011 Added by:Theresa Payton

There is nothing like a nice sunny day driving around town in your car, listening to your favorite music. But did you know that depending upon how you get your music, you might make your home computer vulnerable to hackers and also your car?

Comments  (2)

37d5f81e2277051bc17116221040d51c

Bad News For Banks: Courts Side With Customers

September 03, 2011 Added by:Robert Siciliano

The computer or other device the scammer used to access Comerica’s website could surely have been traced overseas and flagged for: hiding behind a proxy, device anomalies such as a time zone and browser language mismatch, past history of online scams and identity theft, and the list goes on...

Comments  (1)

3e35900ae6facc6c146a85c435c71d82

Ghost in the Wires: The World's Most Wanted Hacker

September 02, 2011 Added by:Ben Rothke

In Ghost in the Wires: My Adventures as the World's Most Wanted Hacker, the first personal account of what really happened; Mitnick says most of the stories around him were the result of the myth of Kevin Mitnick, and nothing more. In the book, he dispels these myths and set the record straight...

Comments  (5)


« First < Previous | 288 - 289 - 290 - 291 - 292 | Next > Last »