Latest Blog Posts


Defense Research Lab Back Online After Attacks

July 18, 2011 Added by:Headlines

Nearly two weeks after an Advanced Persistent Threat (APT) attack caused officials to take systems offline at the Energy Department’s Pacific Northwest National Laboratory (PNNL), nearly all systems have been restored to normal operating parameters...

Comments  (0)


Seven Security Blankets and I'm Still Short-Sheeted

July 17, 2011 Added by:Kevin McAleavey

Client-side "layered security" is a mess. It fails because people are so irritated by all the alerts that they don't understand. They no longer trust their security arrangements, and when they visit a site that offers a rogue antivirus and no alert pops up, they let it run for a second opinion...

Comments  (0)


Software Security Degree Programs

July 17, 2011 Added by:Bozidar Spirovski

More institutions are providing programs and degrees focused on the security aspect of information technology than ever before. Part of the reason for this is the significant projected increase in the number of jobs available in the field...

Comments  (1)


Cyber Criminals Just Came A Callin’ At My House

July 17, 2011 Added by:Rebecca Herold

When I asked him why he called me in particular, he tried to avoid the question. I persisted. Finally I asked him if Microsoft had contracted his company to call me. He then said, “Yes! My company was subcontracted by Microsoft to call me, and that is how I got your information...”

Comments  (21)


Judge Says Its OK to Post Social Security Numbers

July 16, 2011 Added by:Robert Siciliano

Over the years, many have interpreted the to allow Social Security numbers, to be posted online. I’ve seen Social Security numbers for Jeb Bush, Colin Powell, former CIA Director Porter Goss, Troy Aiken, and Donald Trump, all published on the Internet...

Comments  (0)


Weapon Systems Specs Stolen in Contractor Breach

July 16, 2011 Added by:Headlines

Reuters reports that a classified US military weapons system will now need to be redesigned after specs and plans for the system were stolen from a defense contractor database in a breach earlier this year...

Comments  (0)


Why Perform FCPA Due Diligence?

July 15, 2011 Added by:Thomas Fox

Once again, the need for continued vigilance throughout the due diligence process. Simply because your agent/vendor/business relationship is located in the United States, does not mean that you can automatically limit your due diligence inquiry to a Level One search...

Comments  (0)


DoD Releases Strategy for Operating in Cyberspace

July 15, 2011 Added by:Headlines

"Given the integrated nature of cyberspace, computer-induced failures of power grids, transportation networks, or financial systems could cause massive physical damage and economic disruption. DoD operations—both at home and abroad—are dependent on this critical infrastructure...."

Comments  (13)


Senators Inquire About Gov Mobile Phone Tracking

July 15, 2011 Added by:Headlines

Senators Ron Wyden and Mark Udall have drafted a letter addressed to Director of National Intelligence James Clapper with a simple, straight forward question: “Do government agencies have the authority to collect the geolocation information of American citizens for intelligence purposes?”

Comments  (2)


Hey ISC2 - Where is the Opt Out Button?

July 15, 2011 Added by:Boris Sverdlik

I am a security researcher, and my presentation at Security Bsides was written in the same form that most “pen testing” classes are. If you are naïve enough to believe that criminals don’t use security tools in their efforts, then my friend it is finally time to hang up that hat...

Comments  (0)


The Cloud - Time for Some Serious Consideration

July 15, 2011 Added by:Bozidar Spirovski

The cloud is very ripe for web services. But before you choose one, be careful to do a serious consideration on your pros and cons. If you can match your application/site to a cloud service, you can bring it to a new level of efficient operation...

Comments  (0)


Organized Criminal Groups Targeted by DOJ and Romanians

July 15, 2011 Added by:Headlines

An ongoing Internet fraud scheme conducted by several networks of organized cyber criminals in Romania and the United States has been disrupted as a result of a series of law enforcement actions coordinated since 2010 between Romanian and U.S. law enforcement, including numerous arrests...

Comments  (0)


The Best And Most Secure Windows OS Ever

July 14, 2011 Added by:Kevin McAleavey

When it comes to the number one "moment of abject stupidity" that award has to go to "browser/OS integration" with the release of Windows98. There was much outcry including my own testimony at an FTC hearing, and at the end of my testimony, I warned the FTC what was to come from this...

Comments  (5)


Risk Management and Compliance Part Two

July 14, 2011 Added by:Neira Jones

Being prepared remains the best defense against security breaches. As we have seen, organizations still remain slow in detecting and responding to incidents. Nearly two-thirds of breaches continue to be uncovered by external parties and then only after a considerable amount of time...

Comments  (0)


We Are Infosec Professionals - Who the Hell Are You?

July 14, 2011 Added by:Javvad Malik

I explained to someone that I worked in infosec, they commented, “there’s not much you guys do given all the hacking that’s gone on lately.” I could have just explained how a lot of the so-called hacking attacks were actually DDOS, or that human error was responsible, but my mind wandered...

Comments  (11)


How to Inform Customers of a Data Breach

July 14, 2011 Added by:Kelly Colgan

The news is bad: Your company suffered a data breach. Don’t make it worse by sending out a confusing, overly technical or outright alarming letter to your customers. The goal is to inform, educate and reassure your customers, not bore or scare them...

Comments  (0)

« First < Previous | 290 - 291 - 292 - 293 - 294 | Next > Last »