Latest Blog Posts

69dafe8b58066478aea48f3d0f384820

Skype Vulnerable to HTML/JavaScript Code Injection

August 23, 2011 Added by:Headlines

"Does it make sense to allow users to 'embed' HTML code in their Skype profile and especially in those 'phone number' fields? Also, there is no option to define any HTML code in Skype client. I was able to find those bugs with Linux Skype client. I guess they don't focus so much on that client..."

Comments  (0)

A966b1b38ca147f3e9a60890030926c9

The Unfinished State of our National ICS Reporting System

August 23, 2011 Added by:Chris Blask

The rather petulant tone of the advisory indicates problems with the way our system is setup as well as insufficient process and staffing being applied to outbound communications. Certainly, advisories with content and tone like this one are not a step in the right direction...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Documentary Reveals Cyber Attack Software

August 23, 2011 Added by:Headlines

"Now we've got proof. They're also extending their persecution of Falun Gong overseas, attacking a civil website in the U.S. These are the clear messages revealed in these six seconds of video." said Jason Ma, a commentator for New Tang Dynasty Television...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cryptography for Emerging Technologies and Applications

August 23, 2011 Added by:Headlines

The National Institute of Standards and Technology (NIST) is hosting a workshop on Cryptography for Emerging Technologies and Applications that is intended to identify the cryptographic requirements for emerging technologies and applications...

Comments  (0)

E973b16363b3de77b360563237df7e32

Digging for Information with Open Source Intelligence

August 22, 2011 Added by:Bozidar Spirovski

Identify your point of interest - who/what is your target of investigation. Start broad, and then narrow down to the interesting elements, then you can start drilling for material left on the Internet by them for further useful clues...

Comments  (0)

E9e4b2893895604b1b913b7b02e6640b

Twenty-One Steps to Smarter Security

August 22, 2011 Added by:Brian McGinley

Whatever your business, Security Risk Management should be in that pie chart—as an integrated slice of your business. Integration is tenet number one, and as a security professional in your company, your main job is to be a business enabler and evangelist to make this so...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Webinar: Cybersecurity for Electrical Cooperatives

August 22, 2011 Added by:Infosec Island Admin

Free Webinar: NESCO is charged by the DoE with providing information on collaboration, tactical awareness, rapid notification, forensics and applied research. Steve Parker, NESCO Lead, will be hosting the session along with AlienVault's Chris Blask and Trusted Metrics' Michael Menefee...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft Ceases Using Supercookies to Track Users

August 22, 2011 Added by:Headlines

“We don't really know what they were doing with this information, but it's not obvious what this explanation would be. The burden is on Microsoft to explain how it came to be there and how they used it and what they're going to do to make sure it doesn't happen again..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DARPA Calls for Innovation to Protect DoD Systems

August 22, 2011 Added by:Headlines

"The Defense Advanced Research Projects Agency (DARPA) is requesting information on innovative technologies and approaches to secure the Nation’s infrastructure and to ensure the survival of the Department of Defense’s cyber capabilities in case of attack..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Explaining Anonymous, LulzSec, and AntiSec Animus

August 22, 2011 Added by:Infosec Island Admin

Virtual Arkham: Explaining Anonymous, LulzSec, and AntiSec Animus in Our Digital Gotham City: Increasingly over the last year or two I have been seeing analogies both literally, and figuratively between the forces at play and all of it is directly affected by the comic book world of Batman...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Authorities Arrest Man Over Stock Exchange Attack

August 22, 2011 Added by:Headlines

Authorities in Hong Kong have arrested a man on suspicion of conducting a cyber attack against the Hong Kong Exchange (HKEx) nearly two weeks ago. The man was detained late last week and police seized five computers, several mobile phones, and other items, according to reports...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Security in the Board Room: Is Anonymous Our Pink Elephant?

August 21, 2011 Added by:Rafal Los

Many of you have been trying to make Information Security a board-level priority since you took your positions, but it's been an uphill battle the whole way - then came the hacking calamity seemingly breaking into everything, stealing and pillaging like an invading horde. You saw your chance...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Minimum Password Lengths of 15 or More via GPO

August 21, 2011 Added by:Rob Fuller

Also known as "How to practice what we preach". I don't know how long I've been telling clients that they need to have a minimum password length of 15 characters so there is no chance LM will be stored. But I've never tried setting it myself. Well, a client called me out. You can't...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Mobile Application Settles With FTC on COPPA Violations

August 21, 2011 Added by:David Navetta

The FTC alleged that the company’s apps were directed to children and that the applications therefore violated COPPA and the FTC’s COPPA Rule by collecting and disclosing personal information from children without their parents’ prior consent...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Compensation Increases for CIOs and IT Workers in 2011

August 20, 2011 Added by:Bill Gerneglia

According to the first-half 2011 IT salary survey from Janco Associates, IT compensation has increased slightly. While overall employment remains lackluster by most organizations across all industries, there is comfort in the fact that more tech jobs are being added than are being cut...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Foundstone Ultimate Hacking Training Course Discount

August 19, 2011 Added by:Infosec Island Admin

Leaving your network vulnerable to exploits can be catastrophic. Learning how hackers and malicious intruders analyze and target your assets can give you a serious advantage in today's high-tech world. Learn how to assess, penetrate, and secure UNIX and Windows networks and hosts...

Comments  (0)


« First < Previous | 290 - 291 - 292 - 293 - 294 | Next > Last »