Latest Blog Posts


Forensics for Network, Internet, and Cloud Computing

September 06, 2011 Added by:Tony Campbell

A number of chapters had a very long and complete reference section, while a few chapters had no reference section at all, yet it was obvious that they required a reference section. And poor screenshots and lack of references seems like laziness on behalf of the author and publisher...

Comments  (0)


IT Skills and Certifications Paying Less Each Quarter

September 06, 2011 Added by:Bill Gerneglia

The pay premiums for 237 IT certifications continued their terrible performance for a fourth second straight quarter. This trend results in an overall loss in market value of nearly 2 percent for the quarter, according to the Foote Partners report...

Comments  (0)


Preliminary Report on Bogus DigiNotar Certificates

September 06, 2011 Added by:Headlines

"A number of servers were compromised. The hackers have obtained administrative rights to the outside webservers, the CA server Relaties-CA and also to Public-CA. Traces of hacker activity started on June 17th and ended on July 22nd..."

Comments  (0)


China: What Evil Lurks Within?

September 06, 2011 Added by:Joel Harding

Eli Lake of the Washington Post is again using our fear of the unknown against us. In his article, he brings up Huawei's attempts to operate as, well, a business. Huawei is accused, as a high tech telecommunications company, of attempting to get equipment onto the US 4G cell network...

Comments  (1)


DHS Issues Security Bulletin on Anonymous Hackers

September 06, 2011 Added by:Headlines

"These attacks have the potential to result in serious harm, particularly to Law Enforcement... Also, this assessment does not take into account the possibility of a higher-level actor providing Anonymous, LulzSec or a similar group with more advanced capabilities..."

Comments  (0)


The Top Three Hacker Movies Of All Time...

September 06, 2011 Added by:Lee Munson

The movies that hackers love to watch: These movies show the genre in an enlightening way and anyone who makes a living slanging code on the computer can relate to them. Some are classics because of how realistic they are while others are classics because of the cheesy value...

Comments  (0)


Sony Corporation Taps Philip Reitinger as First CISO

September 06, 2011 Added by:Headlines

The Sony breach saga began in April when the PlayStation network servers had been hacked, exposing the records of more than 70 million customers. Sony then discovered that the Online Entertainment network had also been compromised, exposing another 25 million records...

Comments  (0)


Security: What Was Old is New Again

September 06, 2011 Added by:Craig S Wright

So, when all is said and done, we have not really changed much as a species. We love to believe that we as a generation are forging something new and facing problems that no other has faced before, but in reality, the analogy remains as it is always likely to remain. Change is the only constant...

Comments  (0)


California's "Sextortion" Hacker Sentenced to Prison

September 06, 2011 Added by:Headlines

In addition to stealing financial information, Mijangos “read victims’ e-mails and IMs, watched them through their webcams, and listened to them through the microphones on their computers. Often, he then used the information he obtained to play psychological games with his victims...”

Comments  (0)


Information Security as the Doctor of the Enterprise

September 05, 2011 Added by:Robb Reck

Aren’t we in information security playing exactly the same role in our organizations that our doctor’s play in our healthcare? We evaluate, diagnose, and treat our patients, just like our doctors do for us. But our evaluations are called risk assessments instead of checkups...

Comments  (1)


Is Social Media Eroding Our Privacy?

September 05, 2011 Added by:Allan Pratt, MBA

As we have become more and more absorbed in social media, when was the point that we stopped caring about our confidential information? When did we lose control of our privacy? Is the simple solution to blame Mark Zuckerberg? Or should we blame companies who want access to our data?

Comments  (0)


How to Engage Employees in Compliance

September 05, 2011 Added by:Thomas Fox

A compliance professional should see him or herself as a catalyst for problem solving. As a lawyer I understand that you are required to know law and compliance requirements. But remember - it is OK not to know everything. That is the whole point of collaboration...

Comments  (0)


The Hidden Wiki: Layers of The Onion Router Networks

September 04, 2011 Added by:Infosec Island Admin

Someone recently asked if I had ever heard of “The Hidden Wiki” They said they had just perused an ad that purported to offer “hired killer” services. This person immediately thought it was just a joke, but it turns out that hired killers are just the tip of the iceberg within TOR...

Comments  (5)


On Car Hacking Attacks

September 04, 2011 Added by:Theresa Payton

There is nothing like a nice sunny day driving around town in your car, listening to your favorite music. But did you know that depending upon how you get your music, you might make your home computer vulnerable to hackers and also your car?

Comments  (2)


Bad News For Banks: Courts Side With Customers

September 03, 2011 Added by:Robert Siciliano

The computer or other device the scammer used to access Comerica’s website could surely have been traced overseas and flagged for: hiding behind a proxy, device anomalies such as a time zone and browser language mismatch, past history of online scams and identity theft, and the list goes on...

Comments  (1)


Ghost in the Wires: The World's Most Wanted Hacker

September 02, 2011 Added by:Ben Rothke

In Ghost in the Wires: My Adventures as the World's Most Wanted Hacker, the first personal account of what really happened; Mitnick says most of the stories around him were the result of the myth of Kevin Mitnick, and nothing more. In the book, he dispels these myths and set the record straight...

Comments  (5)

« First < Previous | 288 - 289 - 290 - 291 - 292 | Next > Last »