Latest Blog Posts

69dafe8b58066478aea48f3d0f384820

Citigroup Executive Pleads Guilty to Insider Theft of Millions

September 07, 2011 Added by:Headlines

“Foster exploited his position as a trusted insider to embezzle tens of millions of dollars and to conceal the theft for as long as possible. The FBI is determined to uncover bank larceny in any form,” said FBI Assistant Director in Charge Fedarcyk...

Comments  (0)

B09c361cbdc6cf629affdc7db30a186d

Promoting Security Policies Using Organizational Culture

September 06, 2011 Added by:Steven Fox, CISSP, QSA

Optimal utilization of security policies relies on the audience for which they are created. Policy creation and marketing must recognize and capitalize on organizational culture to promote its value proposition. People can be the strongest link in the security chain...

Comments  (0)

C6dd57cb9806eadc9f7915a90d91aa92

Forensics for Network, Internet, and Cloud Computing

September 06, 2011 Added by:Tony Campbell

A number of chapters had a very long and complete reference section, while a few chapters had no reference section at all, yet it was obvious that they required a reference section. And poor screenshots and lack of references seems like laziness on behalf of the author and publisher...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

IT Skills and Certifications Paying Less Each Quarter

September 06, 2011 Added by:Bill Gerneglia

The pay premiums for 237 IT certifications continued their terrible performance for a fourth second straight quarter. This trend results in an overall loss in market value of nearly 2 percent for the quarter, according to the Foote Partners report...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Preliminary Report on Bogus DigiNotar Certificates

September 06, 2011 Added by:Headlines

"A number of servers were compromised. The hackers have obtained administrative rights to the outside webservers, the CA server Relaties-CA and also to Public-CA. Traces of hacker activity started on June 17th and ended on July 22nd..."

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

China: What Evil Lurks Within?

September 06, 2011 Added by:Joel Harding

Eli Lake of the Washington Post is again using our fear of the unknown against us. In his article, he brings up Huawei's attempts to operate as, well, a business. Huawei is accused, as a high tech telecommunications company, of attempting to get equipment onto the US 4G cell network...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

DHS Issues Security Bulletin on Anonymous Hackers

September 06, 2011 Added by:Headlines

"These attacks have the potential to result in serious harm, particularly to Law Enforcement... Also, this assessment does not take into account the possibility of a higher-level actor providing Anonymous, LulzSec or a similar group with more advanced capabilities..."

Comments  (0)

4ff49873e3fed9a24adf0d37ae00b780

The Top Three Hacker Movies Of All Time...

September 06, 2011 Added by:Lee Munson

The movies that hackers love to watch: These movies show the genre in an enlightening way and anyone who makes a living slanging code on the computer can relate to them. Some are classics because of how realistic they are while others are classics because of the cheesy value...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Sony Corporation Taps Philip Reitinger as First CISO

September 06, 2011 Added by:Headlines

The Sony breach saga began in April when the PlayStation network servers had been hacked, exposing the records of more than 70 million customers. Sony then discovered that the Online Entertainment network had also been compromised, exposing another 25 million records...

Comments  (0)

8b5e0b54dfecaa052afa016cd32b9837

Security: What Was Old is New Again

September 06, 2011 Added by:Craig S Wright

So, when all is said and done, we have not really changed much as a species. We love to believe that we as a generation are forging something new and facing problems that no other has faced before, but in reality, the analogy remains as it is always likely to remain. Change is the only constant...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

California's "Sextortion" Hacker Sentenced to Prison

September 06, 2011 Added by:Headlines

In addition to stealing financial information, Mijangos “read victims’ e-mails and IMs, watched them through their webcams, and listened to them through the microphones on their computers. Often, he then used the information he obtained to play psychological games with his victims...”

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Information Security as the Doctor of the Enterprise

September 05, 2011 Added by:Robb Reck

Aren’t we in information security playing exactly the same role in our organizations that our doctor’s play in our healthcare? We evaluate, diagnose, and treat our patients, just like our doctors do for us. But our evaluations are called risk assessments instead of checkups...

Comments  (1)

5e402abc3fedaf8927900f014ccc031f

Is Social Media Eroding Our Privacy?

September 05, 2011 Added by:Allan Pratt, MBA

As we have become more and more absorbed in social media, when was the point that we stopped caring about our confidential information? When did we lose control of our privacy? Is the simple solution to blame Mark Zuckerberg? Or should we blame companies who want access to our data?

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

How to Engage Employees in Compliance

September 05, 2011 Added by:Thomas Fox

A compliance professional should see him or herself as a catalyst for problem solving. As a lawyer I understand that you are required to know law and compliance requirements. But remember - it is OK not to know everything. That is the whole point of collaboration...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Hidden Wiki: Layers of The Onion Router Networks

September 04, 2011 Added by:Infosec Island Admin

Someone recently asked if I had ever heard of “The Hidden Wiki” They said they had just perused an ad that purported to offer “hired killer” services. This person immediately thought it was just a joke, but it turns out that hired killers are just the tip of the iceberg within TOR...

Comments  (5)

D13f77e036666dbd8f93bf5895f47703

On Car Hacking Attacks

September 04, 2011 Added by:Theresa Payton

There is nothing like a nice sunny day driving around town in your car, listening to your favorite music. But did you know that depending upon how you get your music, you might make your home computer vulnerable to hackers and also your car?

Comments  (2)


« First < Previous | 292 - 293 - 294 - 295 - 296 | Next > Last »