Latest Blog Posts

B64e021126c832bb29ec9fa988155eaf

How to Recognize and Analyze a Fake Anti-Virus Message

May 05, 2011 Added by:Dan Dieterle

Trying to figure out how I was redirected to this fake AV site from clicking on a Google image, I found something interesting. Hovering over the picture, I noticed that the website that showed up under the image looked legit, but the image URL pointed to a completely different website...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Sony Tells Congress Anonymous DDoS Aided Breach

May 05, 2011 Added by:Headlines

Initially, Sony representatives did not seek to connect the hacktivist group with the data breach event. That has changed now that forensic investigators have located a file on the hacked PSN systems named "Anonymous" and containing the movement's tagline "We are Legion"...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Architecting Secure Information Systems

May 04, 2011 Added by:Robb Reck

Creating secure systems from the ground up requires different skills than buying and bolting on technologies to implement security after the fact. You have the chance to build this new system with a strong foundation. Do not miss your chance to show how security should be addressed...

Comments  (0)

47d6748b0a28ace8263ed75fec1afe4c

Information Security Policies and Procedures Part 3

May 04, 2011 Added by:Alex Hamerstone

Search engines place a vast body of human knowledge at your fingertips. This vast knowledge often includes the intellectual property of others. Finding policies on the internet and using control H to place your organization’s name in place of another is not only wrong, it is also ineffective...

Comments  (0)

29fb4966bdfcfff5545ae464c771071b

Who's Interested in Privacy, or Online Security For That Matter ?

May 04, 2011 Added by:Gurudatt Shenoy

Unless people take seriously the risks of online commerce and information sharing, it is not going to get better any time soon. My message is simple, I should be the owner and manager of my information and security, not some data center administrator on the cloud...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Qualys Receives Highest Rating in Gartner Report

May 04, 2011 Added by:Headlines

Qualys can deliver security and compliance in an integrated solution that easily interfaces with existing security solutions without the significant cost and complexity associated with deploying and maintaining traditional enterprise software...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Penetration Testers: Backtrack 5 Release Slated for May

May 04, 2011 Added by:Headlines

BackTrack 5 will be based on Ubuntu Lucid (10.04 LTS), will support 32 and 64 bit architectures, and will officially support KDE 4, Gnome and Fluxbox while providing users streamlined ISO downloads of each Desktop Environment...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Hackers Cheat a Stock Market Game

May 04, 2011 Added by:Robert Siciliano

Many gaming sites have increased efforts to detect suspicious players, but savvy criminals have learned to mask their true identities, changing account information to circumvent conventional methods of fraud detection...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Assange Claims Automated Intelligence Gathering on Facebook

May 04, 2011 Added by:Headlines

"Facebook, Google, Yahoo – all these major US organizations have built-in interfaces for US intelligence. It’s not a matter of serving a subpoena. They have an interface that they have developed for US intelligence to use..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NSA Issues Guide for Keeping Home Networks Secure

May 04, 2011 Added by:Headlines

‘Best Practices for Keeping Your Home Network Secure’ is a new guide published by the National Security Agency. This document provides home users directions for keeping their systems secure and protected...

Comments  (0)

Af9c34417f8e5e0d240850bb353b5d40

Basic Secure Coding Practices for C or C++

May 04, 2011 Added by:Keith Mendoza

Most privilege escalations take advantage of being able to modify the code being executed because the application writes to memory locations past what it allocated. However, if you have a variable that uses up more space than the amount of data, that's extra space for an attacker to use...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

FBI: Malicious Software Features Usama bin Laden Links

May 04, 2011 Added by:Headlines

The FBI warns computer users to exercise caution when they receive e-mails that purport to show photos or videos of Usama bin Laden’s recent death. This content could be a virus that could damage your computer...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Critical Keys to Successful Application Security Testing

May 03, 2011 Added by:Rafal Los

Keeping up with the amount of applications being released can often lead to more subtle issues. We can all say with relative confidence that just because an application has been tested does not make it secure - and even the best analysts & testers can miss security defects...

Comments  (0)

Cb7f24bc3f25d24cc77090478a2f30b5

The Dangers of Opening Your Mouth

May 03, 2011 Added by:Eric Irvin

It's important that we continue to listen as much as we talk, and dissect statements, data, and ideas as critically as possible. As the world of Information Security grows, we can not afford to be spoon-fed our thoughts and ideas from speakers, magazine articles, and vendors...

Comments  (1)

44fa7dab2a22dc03b6a1de4a35b7834a

Contemporary CIO Roles and Challenges

May 03, 2011 Added by:Bill Gerneglia

CIOs have to provide solutions and information that enable the business across lots of different platforms that are changing at a very rapid pace. You've got security implications because of this, and user expectations are higher than they were previously...

Comments  (0)

10e258c8d23d441b915c1b2333b6996a

HIPAA HITECH Compliance: No Substitute for Experience

May 03, 2011 Added by:Jack Anderson

Whether you are a large enterprise looking to manage hundreds of internal business units, a business associate looking to provide proof of compliance, or a very small sub-contractor, a comprehensive privacy and information security program is needed to meet HIPAA HITECH compliance...

Comments  (2)


« First < Previous | 290 - 291 - 292 - 293 - 294 | Next > Last »