Latest Blog Posts

A88973e7d0943d295c99820ab9aeed27

Mobile Device Security: The Matrix in 2011

August 15, 2011 Added by:Simon Heron

Remember that scene in the Matrix where our hero Neo is on the run and he just grabs a phone off some bystander and is immediately able to cancel the existing call and dial a new one? That seemed totally believable at the time. I just wondered what the equivalent might be these days?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Operation Shady Rat: Or As I like To Call It...

August 15, 2011 Added by:Infosec Island Admin

It is readily apparent from this POS that McAfee has put out that they are just fishing for some press here for their flagging AV sales. This paper gives nothing relevant to the story around APT and as such, it should be just relegated to the dustbin of the internet and forgotten...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

ISO and IEC Publish Biometric Authentication Standard

August 15, 2011 Added by:Headlines

Unlike other authentication systems, the breach of biometric data is difficult to remedy. Users can not simply alter the authenticating data used to access secure networks, as one would with usernames and passwords - the data is permanently and uniquely identifiable to the individual user...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Hackers Could Target Automated Military Systems

August 15, 2011 Added by:Dan Dieterle

Congress has created a requirement that 1/3 of ALL military ground vehicles be automated or unmanned by 2015. Are automated systems susceptible to malfunctions, glitches or software errors? Are there any instances of these systems turning on their creator? Unfortunately, yes...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

ISA President Larry Clinton Elected the ITSCC Vice Chair

August 15, 2011 Added by:Headlines

Clinton’s election to the ITSCC is critical at this point in time, as some of the legislative efforts underway may serve to fundamentally alter the public-private partnership envisioned in the National Infrastructure Protection Plan and the Obama Administration’s Cyberspace Policy Review...

Comments  (0)

3ebd200287a032cf6d13d6b75a570c94

High Fashion - Low Security

August 15, 2011 Added by:David Martinez

In the end, I had the hashes for the admins table, full customer info from the customers table, as well as the full output of the transactions and users tables, which included MD5 hashes of CC numbers. The hashes were all 64-bits from a MySQL db, which means they were probably SHA256...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Anonymous Defaces BART Site - Posts User Data

August 15, 2011 Added by:Headlines

Hacktivist group Anonymous has hacked into myBART.org website belonging to San Francisco’s BART system. The attack was an SQL injection which was able to extract more than 2,000 records containing names, usernames, passwords (plain text), emails, phone numbers, addresses and zip codes...

Comments  (0)

F7e202a206691e473e509d080620af68

Similarities Between Riots and Modern Internet Hacktivism

August 14, 2011 Added by:Lenny Zeltser

To understand riots, consider the importance of de-individuation of the mob's participants, the importance of instigating events and the role of the "entrepreneur" in starting the chain reaction of a riot. There are parallels to the dynamics of modern Internet hacktivism...

Comments  (3)

C6dd57cb9806eadc9f7915a90d91aa92

Enterprise Mac Security - Mac OS X Snow Leopard

August 14, 2011 Added by:Tony Campbell

Enterprise Mac Security is an absorbing read and equally applicable to securely configuring a Mac server as it is to a Mac laptop. There is so much good quality security material available that it would be easy to allow a review to almost become a book in its own right...

Comments  (1)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Financial Industry Guidance on the Use of Social Media

August 14, 2011 Added by:David Navetta

Banks and other financial institutions face unique issues when it comes to the use of social media. Faced with conflicts between social media platform rules, customer expectations, self-regulatory standards, and the strict regulations that govern the industry, guidance has been issued by BITS...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Hybrid Delivery: Corporate Applications and the Cloud

August 13, 2011 Added by:Rafal Los

As applications start to cross network boundaries between the traditional corporate network and cloud-based providers and service vendors, there is an imminent collision between the application development practices of yore, and the differing requirements around architecting for the cloud...

Comments  (1)

F29746c6cb299c1755e4087e6126a816

Teen Tips for a Safe Cyber Summer

August 13, 2011 Added by:Kelly Colgan

Parents can’t supervise their teens around the clock. So how can you protect your fiercely independent, world-weary, tech-savvy teen—the one with the bad case of selective hearing—from trouble online? Let us do the talking with these tips...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Anonymous Conspiracies That Never Materialize

August 12, 2011 Added by:Infosec Island Admin

Data dumps without context have no real intelligence worth. While this stuff is interesting, it’s certainly not earth shattering. What’s worse is that it makes you all look more and more like the boy who cried wolf than the Deep Throat. This is why I keep harping on Anonymous...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Casey Jones - or How to Stop a Compliance Train Wreck

August 12, 2011 Added by:Thomas Fox

The evaluation of C-Suite leadership can be problematic in the best of times. The C-Suite can be an active part of the problem. While not FCPA violations, the criminal prosecutions at the highest echelon at Enron, WorldCom and Adelphia certainly speak to ethical lapses at the top...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Man Gets Eighteen Years for Hacking Neighbors

August 12, 2011 Added by:Robert Siciliano

In Minnesota prosecutors put away a “depraved criminal” for 18 years as a result of virtually torturing his neighbors via their Wi-Fi connection. After a brief encounter with his new neighbors he began “a calculated campaign to terrorize his neighbors”...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

LinkedIn Ceases Using Member Profiles for Advertising

August 12, 2011 Added by:Headlines

LinkedIn has pulled a one-eighty after receiving overwhelming criticism for using member profiles, images and activity in an advertising campaign. The brunt of the criticism was the decision to "opt-in" members for participation automatically without first getting their expressed permission...

Comments  (0)


« First < Previous | 290 - 291 - 292 - 293 - 294 | Next > Last »