Latest Blog Posts

3e35900ae6facc6c146a85c435c71d82

Surveillance or Security? New Wiretapping Technologies

July 20, 2011 Added by:Ben Rothke

Far too many books on privacy and surveillance are filled with hysteria and hyperbole and the threat of an Orwellian society. This book sticks to the raw facts and details the current state, that of insecure and porous networks around a surveillance society...

Comments  (1)

509ea0c1f4a210534eb004d35c10aa2d

ISA Testimony Before House Cyber Security Task Force

July 20, 2011 Added by:Marjorie Morgan

Speaker of the House Boehner has appointed a task force comprised of Members from the major Committees of the House to develop a framework for cyber security legislation. The ISA was the very first organization that was asked to testify before the Task Force...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Russia Amends Federal Data Protection Law

July 20, 2011 Added by:David Navetta

In the past, some of the strict foreign data protection laws have not been rigorously enforced, giving businesses breathing room. The enforcement landscape is likely to tighten in the near future, however, increasing the risk of investigations and sanctions for privacy violations...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Fostering Compliance Across Your Company

July 20, 2011 Added by:Thomas Fox

Without the support of top management, a compliance program is doomed to failure. This also means that the goals of compliance need to be incorporated into overall leadership goals. If goals are simply performance based, employees will understand that is what the company values...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Canadian Hacker Arrested for Creating Zombie Botnet

July 20, 2011 Added by:Headlines

Canadian authorities have arrested a 24 year old professional information security manager on charges of creating a botnet. Joseph Mercer also infected systems with keylogging software to harvest information, as well as software that allowed him to capture images from unsuspecting victim's webcams...

Comments  (2)

F29746c6cb299c1755e4087e6126a816

Not All Free Identity Theft Services are Created Equal

July 20, 2011 Added by:Kelly Colgan

In order to sign up for identity theft protection services, you have to hand over a lot of vital data about yourself. Do you really want to give this to a company you’ve never done business with before—especially one that’s offering you something for free?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

F-Secure: Malicious PDFs Targeting Defense Contractors

July 20, 2011 Added by:Headlines

"It's a PDF file... sent to an employee of a targeted company as an email attachment. It exploits a known Javascript vulnerability and drops a... backdoor. A decoy PDF file is shown... [as] a call for papers for 2012 AIAA Strategic and Tactical Missile Systems Conference... classified as SECRET..."

Comments  (1)

Ec9b0ab31140696dd578b354b1054635

On Romulan Ale and Bird of Prey Malware

July 20, 2011 Added by:Vulcan Mindm3ld

Defenders are bound by a set of process and procedures. An organization’s inflexibility in deviating from them compound the problems. Many changes are often rejected on the basis of economic concerns. The majority are focusing on useless security guidelines such as the DISA PDI GEN001280...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

FBI: Anonymous Members Arrested for PayPal Attacks

July 20, 2011 Added by:Headlines

Fourteen individuals were arrested by on charges related to their involvement in a cyber attack on PayPal’s website as part of an action claimed by the group “Anonymous,” announced the Department of Justice and the FBI. Two additional defendants were arrested on cyber-related charges...

Comments  (1)

Ba829a6cb97f554ffb0272cd3d6c18a7

Solving The End User Problem

July 19, 2011 Added by:Kevin McAleavey

One of the more useful tools for Windows clients was a product called "Steady State." It allowed a system to be "snapshotted" and in the event of malware intrusion, a reboot would restore the client to its previous snapshot. But like most good ideas, Microsoft discontinued it...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Politics Trumps Security in Dubious White House Hire

July 19, 2011 Added by:Headlines

Callahan was the ex-Clinton staffer who famously lost thousands of White House e-mails which were under subpoena, and was also dismissed by the Department of Homeland Security after a Congressional investigation determined she lied about her education and experience credentials...

Comments  (3)

Bdd5942b986a243fd2d84461611aec6a

Have I Been Skimmed???

July 19, 2011 Added by:Anup Shetty

Hardware tampering on handhelds are tough to crack unless multiple cases lead to the fraudsters. Awareness and regular tracking one's card accounts leads to detection. The next time you swipe your card at a tacky joint that, be sure to be more vigilant on your account...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

PFC Parts' Delectable Cyber Security Shopping List

July 19, 2011 Added by:Don Eijndhoven

A study done by the CSIS speaks of a human capital crisis in Cyber Security and may offer some insights that can also be used outside of the US. CSIS mentions that there are a variety of people and skills needed. From the report we learn that CSIS found a shortage in the following roles...

Comments  (2)

37d5f81e2277051bc17116221040d51c

Spear Phishing Leaves a Bloody Wound

July 19, 2011 Added by:Robert Siciliano

Once criminal hackers get a person’s username and email address, they can begin to launch a targeted spear phish scam. Scammers copy the design of each breached entities outgoing email campaign and blast the breached list with “account update” or other ruses...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Seven No-Cost Security Tune-Ups for Windows

July 19, 2011 Added by:Headlines

"Don't use Internet Explorer or, for that matter, Safari... neither is as secure as Chrome, Firefox or Opera. IE 10 is certainly safer to use than previous versions, but significant security flaws that could expose your Windows system to malicious code online tend to crop up with it..."

Comments  (0)

Bc353c4c6a6f7743290ce11723414424

ASA and IPS Parallel Features – Part II

July 19, 2011 Added by:Dawn Hopper

The value of the normalizer with inline mode cannot be overstated; it can reassemble entire fragmented streams as well as modify packets with illegal and/or malformed options before they reach their target. Not surprisingly, some technical documents refer to this function as packet scrubbing...

Comments  (0)


« First < Previous | 290 - 291 - 292 - 293 - 294 | Next > Last »