Latest Blog Posts

0a8cae998f9c51e3b3c0ccbaddf521aa

Weaponizing Cyberpsychology and Subverting Cybervetting

August 01, 2011 Added by:Rafal Los

In a talk to be shared for the first time at DEF CON 19, members from the UK based volunteer organization the OnlinePrivacyFoundation.org will share the results of their research on examining to what extent it is possible to determine someone’s personality through their Facebook activity...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Anti-Stalking Law Threatens Protected Speech Online

August 01, 2011 Added by:Headlines

"The idea that the government should police every inflammatory word spoken online chills freedom of speech and goes against decades of First Amendment case law. The court must recognize social network users' right to speak freely online, even if that speech is unpopular or offensive to some..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Tradewinds: Discounts on Infosec Training and Certification

July 31, 2011 Added by:Infosec Island Admin

The ISLAND TRADEWINDS program is designed to offer infosec training and certification opportunities at significantly discounted rates. You can receive discounts of up to $500 or 20% on courses from Global Knowledge, Career Academy, SANS, and the Infosec Institute...

Comments  (4)

972cda1e62b72640cb7ac702714a115f

Pastebin Security Risks: Monitoring with Rollyo Searchrolls

July 31, 2011 Added by:Kurt Aubuchon

You might want to keep an eye on the various pastebin sites for mentions of your organization's domain names, IP addresses, proprietary application names, or other info that could be evidence of problems. Unfortunately, keeping an eye on all the pastebins on the internet is difficult...

Comments  (1)

4085079c6fe0be2fd371ddbac0c3e7db

SysAdmin Basics: Why Account Management Is Critical

July 31, 2011 Added by:Jamie Adams

Many SysAdmins are distracted by the urge to patch to address vulnerabilities they aren't susceptible to, or to configure their systems with nifty tricks they found or “how-to” website. This urge is rooted in their belief they are a warrior combating the forces of evil in a cyber war...

Comments  (0)

B451da363bb08b9a81ceadbadb5133ef

TeamSHATTER Analysis Of The July 2011 Oracle CPU

July 31, 2011 Added by:Alexander Rothacker

With ‘unbreakable’ timeliness, Oracle released their 27th Critical Patch Update. They shipped 78 security fixes over all their product families. Sixteen of the fixes are specific to the Oracle Database, but a total of 30 fixes have an impact on database confidentiality, integrity or availability...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Steve Parker, Infosec Island PR Advisor Dies Unexpectedly at 58

July 30, 2011 Added by:Infosec Island Admin

I meant to post this 2 weeks ago when it happened, but I wanted to put a short post here about Steve Parker, Infosec Island's PR and Marketing partner. Steve died unexpectedly in his sleep 2 weeks ago at the young age of 58. Steve originally came up with the name "Infosec Island"

Comments  (9)

37d5f81e2277051bc17116221040d51c

Preparing a Mobile or PC for Resale or Donation

July 29, 2011 Added by:Robert Siciliano

You may have read my last post where I talked about “Clean the Clutter” out of your life and sell all the stuff you don’t absolutely need. Prior to selling my electronics I wiped all the data off of each device. Cleaning all the data off your salable electronics is absolutely essential...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

The U.S. and China are Engaged in a Cyber Cold War

July 29, 2011 Added by:Headlines

"China is likely using its maturing computer network exploitation capability to support intelligence collection against the U.S. government and industry by conducting a long term, sophisticated, computer network exploitation campaign," according to a Northrop Grumman report...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Doxing, Disinformation, and the Fifth Battlespace

July 29, 2011 Added by:Infosec Island Admin

The recent arrests of alleged key members of LulzSec and Anonymous have been called into question by the 'Web Ninja’s'. Yesterday, they posted the following on their page concerning the arrest of a man from the Shetland Islands who is purported to be 'Topiary'...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Today is Annual System Administrator Appreciation Day

July 29, 2011 Added by:Headlines

While we enjoy the opportunity to go home from the office at the end of the work day, SysAdmins are still on the job fighting off unauthorized access attempts, protecting our sensitive data, and working hard to improve network performance...

Comments  (1)

49afa3a1bba5280af6c4bf2fb5ea7669

Authentication: Who Are You and Why Are You Here?

July 29, 2011 Added by:Mike Meikle

You may have robust network security, stringent password policies and a tightly locked down user environment, but if you don’t know what you own, both data and hardware, it is akin to having a bank vault door standing alone in a field...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS Announces Partnership To Protect Kids Online

July 29, 2011 Added by:Headlines

"Now, more than ever, it is important that all Americans — adults and children alike — learn to protect themselves online and do their part to ensure that cyberspace is a safe and secure environment for all Internet users..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Stroke Development Versus Not Drowning

July 28, 2011 Added by:Rafal Los

Sony, Fox/Murdoch, et al, are all being harried by vulnerabilities left open in the backwaters of their infrastructure, not by bruteforce through the main gates. What little surprises might one find by using this time for review and planning?

Comments  (0)

959779642e6e758563e80b5d83150a9f

Medical Device Security in a Hospital Network

July 28, 2011 Added by:Danny Lieberman

Developing for embedded Linux is not copy and paste from Windows. It requires expertise to setup the basic infrastructure. But, once that infrastructure is up, the medical device developer and it’s hospital customer can be confident that they are standing on a secure platform...

Comments  (2)

7c5c876d1933023ac375eead04302e1a

How Not to Do the News

July 28, 2011 Added by:Boris Sverdlik

Frazier McGinn had come into the channel asking @abhaxas questions that anybody familiar with Anonymous, #AntiSec and likes would of already known. The Interview turned into one of the biggest trollfests I had ever witnessed. At points, I was laughing so hard my side hurt...

Comments  (0)


« First < Previous | 290 - 291 - 292 - 293 - 294 | Next > Last »