Latest Blog Posts


Five Ways You Endanger Your Friends Online

September 16, 2011 Added by:Kelly Colgan

Many GPS-enabled smartphones automatically add geolocation data to photos. That means anyone can find out exactly where that photo you posted was taken. Post one of your friend standing in front of her prized new painting, and it’s like letting a thief case her home from his couch...

Comments  (0)


Security BSides is Coming to Dallas / Fort Worth

September 16, 2011 Added by:Security BSides

Each BSides is a community-driven framework for building events for and by information security community members. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening. You don’t want to miss it...

Comments  (0)


Hackers Targeting Small Businesses

September 16, 2011 Added by:Robert Siciliano

Big companies and big government get big press when their data is breached. When a big company is hit, those whose accounts have been compromised are often notified. With smaller businesses, however, victims are often in the dark, regardless of the state laws requiring notification...

Comments  (0)


FBI Investigating Over 400 Corporate Account Takeovers

September 16, 2011 Added by:Headlines

"The FBI is currently investigating over 400 reported cases of corporate account takeovers in which cyber criminals have initiated unauthorized ACH and wire transfers... These cases involve the attempted theft of over $255 million and have resulted in the actual loss of approximately $85 million..."

Comments  (0)


Companies Using Secure Protocols in an Insecure Manner

September 16, 2011 Added by:Cor Rosielle

I only looked at the Fortune 500 companies with knowledgeable IT and security staff, and with a board and directors who should care about security and have sufficient budget to get these basic things right. Let's hope the companies are as disappointed about these results as I was...

Comments  (8)


DigiNotar Banned from Issuing New Digital Certificates

September 16, 2011 Added by:Headlines

"An unauthorized third party (hacker) has been active on the CA server that is used for issuing qualified certificates... The integrity of the data on the [DigiNotar] server that is used for production and issuance of qualified certificates is therefore impossible to guarantee..."

Comments  (0)


Why Encryption Alone Isn’t Enough

September 16, 2011 Added by:Emmett Jorgensen

There are variables at work that often require security measures above and beyond encryption. The confidentiality of the data you are working with, state, federal and industry regulations, user habits, platforms and more all factor into the security measures needed to safeguard your data...

Comments  (0)


NATO Seeks Cyber Alliance with India

September 16, 2011 Added by:Headlines

Chinese state backed hackers are not the only threat we are facing. The Russian Business Network and other foreign government-backed entities are falling from the radar as Chinese hackers take center stage. Lets not forget the lone hackers or hacktivist groups that are very active...

Comments  (0)


Internet Piracy, Plagiarism and the Security Professional

September 16, 2011 Added by:Craig S Wright

The issue is that some in the security industry leverage the works of others coupled with external promotion to seem more than they are. We all suffer for this, and in a field as critical as security the costs can be disproportionate to the damage an individual could seem to be able to create...

Comments  (5)


IP Resolution Using Meterpreter’s Railgun

September 15, 2011 Added by:Rob Fuller

I saw a post back in June titled DNS Port Forwarding Con Meterpreter. It looked like hard work to set that up. I didn’t want to go through that every time I got onto a new network. So I made a simple meterpreter post module to just call a Windows API key called ‘gethostbyaddr’ using Railgun...

Comments  (4)


Cloud Computing Challenges at Federal Agencies

September 15, 2011 Added by:Kevin L. Jackson

The use of commodity components, coupled with highly automated controls, enable cloud computing. These characteristics also enable the economic model that makes it so disruptive to the status quo. As an example, the cloud delivery model typically does not require any advance usage commitment...

Comments  (0)


New SpyEye Variant Targeting Android Devices

September 15, 2011 Added by:Headlines

The new variant is designed to harvest text messages that contain a one-time use code sent to customers by institutions as an added security measure for clients engaged in mobile banking transactions, making SpyEye an even more powerful tool for stealing financial login credentials...

Comments  (0)


How to Wage War in Cyberspace with Iran

September 15, 2011 Added by:Joel Harding

Iran has already begun deployment of cyber forces in small teams throughout the world to avoid devastation if the networks internal to Iran are crippled. A myriad of intelligence agencies are gathering as much intelligence as possible for a possible war in cyberspace with Iran...

Comments  (2)


NIST Releases Secure Cloud Computing Guidelines

September 15, 2011 Added by:Headlines

NIST is responsible for accelerating the federal government’s secure adoption of cloud computing by leading efforts to develop standards and guidelines in close consultation and collaboration with standards bodies, the private sector and other stakeholders, including federal agencies...

Comments  (0)


Defining the Edge of Responsibility in Mobile Applications

September 15, 2011 Added by:Rafal Los

It is critical to let your customers know where your responsibility ends. One of the most dangerous things an organization can do is try to push that perimeter and to protect every client. This can get incredibly costly, and incredibly difficult to defend in court...

Comments  (0)


Hacker Halted and the CyberLympics Hacking Challenge

September 15, 2011 Added by:Infosec Island Admin

Hacker Halted USA 2011 will not just be another IT security conference. It will be a masterpiece showcase that has some of the world's best security experts congregate at one location. Hackers Are Here. Where Are You?

Comments  (0)

« First < Previous | 288 - 289 - 290 - 291 - 292 | Next > Last »