Latest Blog Posts

69dafe8b58066478aea48f3d0f384820

UPDATE: Hong Kong Trading Halted by DDoS Attack

August 11, 2011 Added by:Headlines

Trading on Hong Kong’s stock market, Hong Kong Exchanges and Clearing, remains suspended today following a “coordinated and sustained” distributed denial of service attack on one of the exchange’s websites Wednesday...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

FINRA Fines Citigroup for Failing to Detect Fraud

August 11, 2011 Added by:Headlines

FINRA found that Citigroup failed to detect or investigate a series of "red flags" that upon further inquiry should have alerted the firm to the improper use of customer funds, including reports reflecting suspicious transfers of funds between unrelated accounts...

Comments  (1)

E973b16363b3de77b360563237df7e32

Information Gathering - Lessons from The Big Short

August 11, 2011 Added by:Bozidar Spirovski

Regardless of whether you need to collect information on a potential competitor, the target of a penetration test, for financial spread betting and derivatives trading, or even for financial research of a company there are several lessons that the "The Big Short" teaches us...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Congress Wants McAfee Briefing on Operation Shady Rat

August 11, 2011 Added by:Headlines

"If these intrusions can be classified as more 'unsophisticated' and 'opportunistic,' what is the threat of the more 'insidious' intrusions on which McAfee has focused in recent years? How can we effectively prevent or mitigate these more insidious intrusions?"

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Majority of Bankers Say Cyber Crime is Uncontrollable

August 11, 2011 Added by:Headlines

The results of a live poll conducted at its annual North American Insights client conference show fraud and cyber crime continue to be among the most daunting issues that banks are facing today. Bankers believe it is a challenge that they will never be able to get under control...

Comments  (0)

065b7cfbbb03ac9d18cbf5ed0615b40a

Juniper SRX Tips: Altering Default Deny Behavior

August 10, 2011 Added by:Stefan Fouant

With just a couple of lines of code we can streamline the configuration, in this case creating an explicitly defined deny policy which logs all traffic that would otherwise be silently discarded. Best of all, we can do so without having to resort to manual configurations of each one...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Ten Password Tips that Never Go Out of Style

August 10, 2011 Added by:Allan Pratt, MBA

I know what you’re thinking: not another post about passwords. The truth is, no matter how many times those of us in the infosec arena talk, cajole, and plead with users to create complex passwords, they don’t follow directions. Instead, they come crying to us after something bad happens...

Comments  (9)

Fc152e73692bc3c934d248f639d9e963

End-to-End Encryption – The Rest Of The Story

August 10, 2011 Added by:PCI Guru

If you discuss E2EE with any merchant, most see it as this panacea, something that will get them out of the PCI compliance game altogether. However, nothing could be further from the truth. If anything, E2EE may make PCI compliance even more daunting than it is today...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Adobe Releases Critical Patches for Multiple Products

August 10, 2011 Added by:Headlines

Adobe has released patches for multiple products, including Flash, Shockwave, Photoshop and RoboHelp. This is the first security update released in nearly a month, and four of the five updates are labeled as being of "Critical Severity". Summaries and links to the patches are as follows...

Comments  (0)

3ebd200287a032cf6d13d6b75a570c94

Quiet Please - H4xing in Progress

August 10, 2011 Added by:David Martinez

I used this script from the BT5 How-To page, which grabs packets, redirects them through sslstrip, prints the info to my machine, and sends it to the end-user with a spoofed source. Within 30 minutes, I had at least 5 different passwords for FB, Twitter, G-mail, and others...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Anonymous Threatens to "Destroy" Facebook

August 10, 2011 Added by:Headlines

"Facebook is the opposite of the Antisec cause. You are not safe from them nor from any government. One day you will look back on this and realise what we have done here is right, you will thank the rulers of the internet, we are not harming you but saving you..."

Comments  (2)

44a2e0804995faf8d2e3b084a1e2db1d

Improving the IT Security Industry – A Top-Down Effort

August 10, 2011 Added by:Don Eijndhoven

Compared to other industries, mistakes made by IT personnel aren't always obvious. Systems may keep on working and may even work properly when its poorly configured. If a system does crash, its often very hard to quantify exactly how much damage there is and what it has cost the company...

Comments  (2)

4ed54e31491e9fa2405e4714670ae31f

Meterpreter Script – Deploy_nmap.rb

August 09, 2011 Added by:Kyle Young

I programmed a meterpreter script that downloads the latest stable version of nmap from www.insecure.org and then deploys nmap onto the victim’s machine. You could then use the victim’s machine to do vulnerability scanning with nmap’s scripting engine...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Is Your CIO an Insomniac?

August 09, 2011 Added by:Bill Gerneglia

In many cases they lack the proper staff and dedicated resources to properly battle the daily IT disruptions. They are at times responsible for technology budgets, servers, applications, and IT staff that are outside their control - this leads to stress and often sleep deprivation...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Standards Will Bring Mobile Payment Security

August 09, 2011 Added by:Robert Siciliano

The mobile carriers want to control near-field communication and mobile payment fees by maintaining control over the phones payment technology containing their users’ credentials. Meanwhile, consumers crave mobile payment and must adapt until the big guys fight it out to see who ends up top dog...

Comments  (2)

B64e021126c832bb29ec9fa988155eaf

Correctional Facilities Vulnerable to Stuxnet-Style Attacks

August 09, 2011 Added by:Dan Dieterle

If a prison PLC system could be exploited, prison doors could be opened allowing prisoners to escape or doors could be forced closed creating safety issues. Also, all of the doors could be opened or closed at the same time damaging the control systems with a large influx of current...

Comments  (0)


« First < Previous | 290 - 291 - 292 - 293 - 294 | Next > Last »