Latest Blog Posts

4085079c6fe0be2fd371ddbac0c3e7db

How Accurate is Your Software Vulnerability Scanner?

April 05, 2011 Added by:Jamie Adams

System admins must take into account all methods in which software may get installed onto systems. A strong change management program and strict access is required. Unfortunately, I have yet to experience an all-encompassing software version scanner and patch management tool...

Comments  (2)

Fc152e73692bc3c934d248f639d9e963

PCI SSC Updates the ASV Training Program

April 05, 2011 Added by:PCI Guru

The ASV training program has blindsided the ASV community as it was a total surprise. Yes, there has been talk over the years at the Community Meetings and in other venues regarding ASV qualifications and training, but nothing ever seemed to come from those discussions...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Commodity Clouds for Enterprise: Inside the Economics

April 05, 2011 Added by:Ben Kepes

Unfortunately, in the light of what can only be called FUD on the part of more traditional vendors, it is natural that those building clouds in the most efficient (read cheapest) of ways, fight back against some of that spin...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

WikiLeaks Source Manning Used Data-Mining Software

April 05, 2011 Added by:Headlines

The U.S. Army has confirmed that accused WikiLeaks source Bradley Manning had installed data-mining software on his SIPRnet-linked computer during the same period he is suspected of harvesting hundreds-of-thousands of classified government documents...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Facebook Continually Plagued with Malware and Scams

April 05, 2011 Added by:Headlines

"An estimated 600,000 people have clicked onto the link, which falsely promises to show them a funny Photoshopped image of themselves. In reality users install a rogue application which sends messages to their contacts via the social network's IM feature, continuing the infection cycle..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Does Multi-Factor Authentication Even Matter Anymore?

April 05, 2011 Added by:Rafal Los

Multi-factor authentication systems that use one-time passwords give the attacker a very small window within which to strike. They have that one session, and then they have to orchestrate the attack again, whereas with a password compromise you can keep attacking over and over...

Comments  (10)

69dafe8b58066478aea48f3d0f384820

Top Ten Embarrassing Data Breach Events

April 05, 2011 Added by:Headlines

As the Epsilon data breach continues to grow to epic proportion, with the latest reports estimating that the client data of at least fifty major company's has been compromised, Tom Brewster has published an article with his list of the top ten most embarrassing data breaches to date...

Comments  (0)

84e08063452899ef6bda9d1e459bcdcd

Cyber Security Strategies Summit: Security in a Digital World

April 05, 2011 Added by:Ben Zvaifler

A new wave of cyber warfare has taken form, targeting our information and threatening the stability of our nation's government and corporations worldwide. Security and privacy professionals have answered with innovative techniques in a constantly shifting environment...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec Report Details the Evolving Threat Landscape

April 05, 2011 Added by:Headlines

"Stuxnet and Hydraq... represented true incidents of cyberwarfare and have fundamentally changed the threat landscape. The nature of the threats has expanded from targeting individual bank accounts to targeting the information and physical infrastructure of nation states..."

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

The Art of Cyber Warfare - Educational Fail

April 04, 2011 Added by:J. Oquendo

Is there a solution to the ever continuing FUD machine? Cyberwarfare is over-hyped and misrepresented. The fact is, even responsible individuals get it wrong consistently. This is how and why we fail, and will continue to fail, to defend against "computer related" attacks...

Comments  (2)

A7290c5bd7bc2aaa7ea2b6c957ef639b

What's Next for the FTC's Proposed Privacy Framework?

April 04, 2011 Added by:David Navetta

Shortly after the FTC Privacy Framework's release and its “Do Not Track” proposal, the response was robust to say the least. Several major web browsers announced support for a browser-based means of defeating persistent online tracking...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Adobe Flash Zero Day Bug Central to RSA Hack

April 04, 2011 Added by:Headlines

Hackers sent emails to a select group of RSA employees with a spreadsheet attachment which contained malware that exploited a flaw in the Adobe software that allowed them the opportunity to glean authentication credentials that enabled access to other systems in the network...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Spyware and Keyloggers Pose Major Identity Theft Threat

April 04, 2011 Added by:Robert Siciliano

Spyware is sold legally in the United States. This software records chats, emails, browsing history, usernames, passwords, and basically everything a person does on that PC. Some spyware programs can record everything in a video file, which can then be accessed remotely...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Sony Becomes Latest Operation Payback Attack Target

April 04, 2011 Added by:Headlines

The rogue hacktivist movement known as Anonymous has now turned its anti-copyright campaign Operation Payback against the Sony Corporation. The operation comes just one week after a similar attack was launched against the RIAA, which is seeking trillions of dollars in damages from LimeWire...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Stuxnet’s Potential for A Chernobyl-Style Incident at Bushehr

April 04, 2011 Added by:Infosec Island Admin

People in the know are worried that Stuxnet was released into systems that were not completely understood. Iran, being as hard to get intel on, may have had configurations that the creators of Stuxnet did not account for, and it could indeed have caused a larger catastrophe...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Epsilon Data Breach Affects Multiple Companies

April 04, 2011 Added by:Headlines

The company states that their systems experienced and unauthorized access event that has exposed the names and email addresses of the customers the company's clients serve. Initial reports indicate that no financial data was revealed in the breach...

Comments  (1)


« First < Previous | 290 - 291 - 292 - 293 - 294 | Next > Last »