Latest Blog Posts

4085079c6fe0be2fd371ddbac0c3e7db

Getting Started with the New Red Hat 5 STIG

August 18, 2011 Added by:Jamie Adams

The generic UNIX STIG supported numerous UNIX and Linux distributions but never addressed Red Hat Enterprise Linux 5. For many years, this lack of support was a source of frustration for system administrators. I've completed my initial review and I want to share some of my findings and tips...

Comments  (2)

49afa3a1bba5280af6c4bf2fb5ea7669

And Now a Word from Your Commonsense

August 18, 2011 Added by:Mike Meikle

As infosec pros debate the finer points of IPv6, cloud security, it behooves us to stop and remember our customers. They don’t care if your solution is FIPS certified and is SAS 70 compliant. They are only concerned if their identity is stolen and used to open a pickle stand in Zanzibar...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Seven Areas of Concern With Cloud Security

August 18, 2011 Added by:Brent Huston

Opportunities abound for those who desire to guide cloud computing. Those concerned with keeping cloud computing an open system drafted an Open Cloud Manifesto, asking that a straightforward conversation needs to occur in order to avoid potential pitfalls...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Five Security Considerations for a Mobile Phone

August 18, 2011 Added by:Robert Siciliano

Mobile users have recently captured the attention of cyber criminals. The Department of Homeland Security and the STOP. THINK. CONNECT. program recommends the following tips to help you protect yourself and to help keep the web a safer place for everyone...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

VoIP Vendor Ooma Outage: No DoS Attack Involved

August 18, 2011 Added by:Headlines

Customer services were interrupted by a power failure at the company's data center while their corporate website was simultaneously experiencing excessive traffic levels that was initially reported to have been caused by a denial of service (DoS) attack...

Comments  (1)

850c7a8a30fa40cf01a9db756b49155a

I Know Who You Hacked Last Summer - Attribution 101

August 18, 2011 Added by:J. Oquendo

The media, security companies, and the “Cybersecurity Industrial Complex” labels almost all attacks as Advanced Persistent Threats almost always originating from China. The mechanism for identifying the attackers is always the same: "The attacker came from the following IP address..."

Comments  (7)

69dafe8b58066478aea48f3d0f384820

Top Ten Most Expensive Network Attacks in History

August 18, 2011 Added by:Headlines

Quantifying the cost of a cyber attack is admittedly subjective on some levels given that the scope of the impact may not be readily reportable and collateral damage is difficult to pinpoint, but the author does manage to assemble a viable list of the most devastating network attacks...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

The Life of a Zero Day Worm

August 18, 2011 Added by:Javvad Malik

Given the number of devices currently connected to the internet, factoring in new devices that are being added daily, subtracting devices being removed, factoring in energy reserves and the possibility of a giant tsunami wiping out humanity, I have approximately 134.2 years to go...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Spammers Raise Their Game

August 18, 2011 Added by:Headlines

According to new research conducted by M86 Security Labs, the number of malicious spam emails has increased significantly in August. Last week spams increased by 13%, while this week it has increased another 24%. The majority of these spams are coming from the Cutwail, Festi and Asprox botnets...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Black Hat’s Place in Enterprise Information Security

August 17, 2011 Added by:Robb Reck

Throughout the Black Hat briefings, I didn’t once hear the words “defense in depth” or “return on investment.” What I got instead is examples of how the bad guys are going to break into specific systems. Black Hat doesn’t have a management track, the focus is on hands-on attacks and of systems...

Comments  (3)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Real Consequences of an Anonymous Data Leak

August 17, 2011 Added by:Rafal Los

I know many of my colleagues in infosec sympathize with the Anonymous cause, because it's not too difficult to do so. While I won't comment on how I feel about that - I can tell you I absolutely do not condone the reckless actions and short-sighted activity that leads to more harm than good...

Comments  (2)

5029f8f9d65d988cb378fc0290f86cc4

Gap Analysis in Supply Chain Management

August 17, 2011 Added by:Mary Shaddock Jones

In many industries, international trade is more of a necessity than a luxury. The ability of a company to compete and financially grow in a particular industry may depend upon tailoring a program to buy and sell goods and services from and to companies and consumers in other countries...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Internet Security Alliance Pans Obama's Security Plan

August 17, 2011 Added by:Headlines

"This is a punitive model where we're trying to blame the victims of the attack. I don't think that the administration's proposal really does anything that I can see to enhance cybersecurity," said Larry Clinton, President of the Internet Security Alliance...

Comments  (0)

4e21f96122846f32545687ad42b271e2

Agnitio v2.0 and Mobile Apps

August 17, 2011 Added by:Security Ninja

Regardless of the resource exposure based on the arguments to the creation function, malicious applications or malicious users that have root access to the device will be able to read or write to anything on the device. Truly sensitive data should never be stored on the device itself...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

GAO Report: FDIC Information Security is Inadequate

August 17, 2011 Added by:Headlines

According to the GAO, the FDIC has not always required strong passwords systems; reviewed user access to financial information; encrypted information transmitted over and stored on its network; protected powerful database accounts and privileges from unauthorized use...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

SpyEye Trojan Source Code Now in the Wild

August 17, 2011 Added by:Headlines

"Now that SpyEye has been outed, it is only a matter of time before this becomes a much larger malware threat than any we have seen to date. So for the next few months, please hold onto your seats people… this ride is about to get very interesting..."

Comments  (0)


« First < Previous | 290 - 291 - 292 - 293 - 294 | Next > Last »