Latest Blog Posts

69dafe8b58066478aea48f3d0f384820

How to Scam $8 Million Dollars in Three Easy Steps

April 06, 2011 Added by:Headlines

“What's most frightening is the fact that this isn't just an unknowing private citizen being duped by a phony Facebook friend. This is a multibillion dollar corporation that clearly did not do its homework," said Paul Henry, a forensics and security analyst at Lumension...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Wireless Security – Choosing the Best Wi-Fi Password

April 06, 2011 Added by:Dan Dieterle

WPA2 Enterprise is the best if your organization supports it, but WPA2 Personal is great for home and small offices. Do not use WEP. It was cracked a long time ago, and an attacker does not even have to crack it, as the WEP key can be passed just like NTLM passwords...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

MITM Attack Exploits Windows IPv6 Protocols

April 06, 2011 Added by:Headlines

“All these Windows boxes will default connect to the evil router instead of the legitimate router when this parasitic overlay is running. If Microsoft didn't have that configuration by default, it would negate a lot of the effects of the attack..."

Comments  (0)

959779642e6e758563e80b5d83150a9f

How to Make Federal Data Security Effective

April 06, 2011 Added by:Danny Lieberman

In order to improve IT security countermeasure effectiveness in the Federal Government, the OMB should reduce base payments to contractors who provide IT security services and link their compensation to a reduction in the damage caused to government data and network assets...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

PS3 Running Linux Serves Up LOIC in Sony DDoS Attack

April 06, 2011 Added by:Headlines

There is more than a touch of irony to the notion that a "jailbroken" PlaySation3 running an unsanctioned Linux operating system, the very impetus for the legal action brought by Sony against Hotz and Egorenkov, would be employed in a DDoS attack against Sony domains...

Comments  (1)

4085079c6fe0be2fd371ddbac0c3e7db

How Accurate is Your Software Vulnerability Scanner?

April 05, 2011 Added by:Jamie Adams

System admins must take into account all methods in which software may get installed onto systems. A strong change management program and strict access is required. Unfortunately, I have yet to experience an all-encompassing software version scanner and patch management tool...

Comments  (2)

Fc152e73692bc3c934d248f639d9e963

PCI SSC Updates the ASV Training Program

April 05, 2011 Added by:PCI Guru

The ASV training program has blindsided the ASV community as it was a total surprise. Yes, there has been talk over the years at the Community Meetings and in other venues regarding ASV qualifications and training, but nothing ever seemed to come from those discussions...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Commodity Clouds for Enterprise: Inside the Economics

April 05, 2011 Added by:Ben Kepes

Unfortunately, in the light of what can only be called FUD on the part of more traditional vendors, it is natural that those building clouds in the most efficient (read cheapest) of ways, fight back against some of that spin...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

WikiLeaks Source Manning Used Data-Mining Software

April 05, 2011 Added by:Headlines

The U.S. Army has confirmed that accused WikiLeaks source Bradley Manning had installed data-mining software on his SIPRnet-linked computer during the same period he is suspected of harvesting hundreds-of-thousands of classified government documents...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Facebook Continually Plagued with Malware and Scams

April 05, 2011 Added by:Headlines

"An estimated 600,000 people have clicked onto the link, which falsely promises to show them a funny Photoshopped image of themselves. In reality users install a rogue application which sends messages to their contacts via the social network's IM feature, continuing the infection cycle..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Does Multi-Factor Authentication Even Matter Anymore?

April 05, 2011 Added by:Rafal Los

Multi-factor authentication systems that use one-time passwords give the attacker a very small window within which to strike. They have that one session, and then they have to orchestrate the attack again, whereas with a password compromise you can keep attacking over and over...

Comments  (10)

69dafe8b58066478aea48f3d0f384820

Top Ten Embarrassing Data Breach Events

April 05, 2011 Added by:Headlines

As the Epsilon data breach continues to grow to epic proportion, with the latest reports estimating that the client data of at least fifty major company's has been compromised, Tom Brewster has published an article with his list of the top ten most embarrassing data breaches to date...

Comments  (0)

84e08063452899ef6bda9d1e459bcdcd

Cyber Security Strategies Summit: Security in a Digital World

April 05, 2011 Added by:Ben Zvaifler

A new wave of cyber warfare has taken form, targeting our information and threatening the stability of our nation's government and corporations worldwide. Security and privacy professionals have answered with innovative techniques in a constantly shifting environment...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec Report Details the Evolving Threat Landscape

April 05, 2011 Added by:Headlines

"Stuxnet and Hydraq... represented true incidents of cyberwarfare and have fundamentally changed the threat landscape. The nature of the threats has expanded from targeting individual bank accounts to targeting the information and physical infrastructure of nation states..."

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

The Art of Cyber Warfare - Educational Fail

April 04, 2011 Added by:J. Oquendo

Is there a solution to the ever continuing FUD machine? Cyberwarfare is over-hyped and misrepresented. The fact is, even responsible individuals get it wrong consistently. This is how and why we fail, and will continue to fail, to defend against "computer related" attacks...

Comments  (2)

A7290c5bd7bc2aaa7ea2b6c957ef639b

What's Next for the FTC's Proposed Privacy Framework?

April 04, 2011 Added by:David Navetta

Shortly after the FTC Privacy Framework's release and its “Do Not Track” proposal, the response was robust to say the least. Several major web browsers announced support for a browser-based means of defeating persistent online tracking...

Comments  (0)


« First < Previous | 290 - 291 - 292 - 293 - 294 | Next > Last »