Latest Blog Posts

69dafe8b58066478aea48f3d0f384820

Cryptography for Emerging Technologies and Applications

August 23, 2011 Added by:Headlines

The National Institute of Standards and Technology (NIST) is hosting a workshop on Cryptography for Emerging Technologies and Applications that is intended to identify the cryptographic requirements for emerging technologies and applications...

Comments  (0)

E973b16363b3de77b360563237df7e32

Digging for Information with Open Source Intelligence

August 22, 2011 Added by:Bozidar Spirovski

Identify your point of interest - who/what is your target of investigation. Start broad, and then narrow down to the interesting elements, then you can start drilling for material left on the Internet by them for further useful clues...

Comments  (0)

E9e4b2893895604b1b913b7b02e6640b

Twenty-One Steps to Smarter Security

August 22, 2011 Added by:Brian McGinley

Whatever your business, Security Risk Management should be in that pie chart—as an integrated slice of your business. Integration is tenet number one, and as a security professional in your company, your main job is to be a business enabler and evangelist to make this so...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Webinar: Cybersecurity for Electrical Cooperatives

August 22, 2011 Added by:Infosec Island Admin

Free Webinar: NESCO is charged by the DoE with providing information on collaboration, tactical awareness, rapid notification, forensics and applied research. Steve Parker, NESCO Lead, will be hosting the session along with AlienVault's Chris Blask and Trusted Metrics' Michael Menefee...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft Ceases Using Supercookies to Track Users

August 22, 2011 Added by:Headlines

“We don't really know what they were doing with this information, but it's not obvious what this explanation would be. The burden is on Microsoft to explain how it came to be there and how they used it and what they're going to do to make sure it doesn't happen again..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DARPA Calls for Innovation to Protect DoD Systems

August 22, 2011 Added by:Headlines

"The Defense Advanced Research Projects Agency (DARPA) is requesting information on innovative technologies and approaches to secure the Nation’s infrastructure and to ensure the survival of the Department of Defense’s cyber capabilities in case of attack..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Explaining Anonymous, LulzSec, and AntiSec Animus

August 22, 2011 Added by:Infosec Island Admin

Virtual Arkham: Explaining Anonymous, LulzSec, and AntiSec Animus in Our Digital Gotham City: Increasingly over the last year or two I have been seeing analogies both literally, and figuratively between the forces at play and all of it is directly affected by the comic book world of Batman...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Authorities Arrest Man Over Stock Exchange Attack

August 22, 2011 Added by:Headlines

Authorities in Hong Kong have arrested a man on suspicion of conducting a cyber attack against the Hong Kong Exchange (HKEx) nearly two weeks ago. The man was detained late last week and police seized five computers, several mobile phones, and other items, according to reports...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Security in the Board Room: Is Anonymous Our Pink Elephant?

August 21, 2011 Added by:Rafal Los

Many of you have been trying to make Information Security a board-level priority since you took your positions, but it's been an uphill battle the whole way - then came the hacking calamity seemingly breaking into everything, stealing and pillaging like an invading horde. You saw your chance...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Minimum Password Lengths of 15 or More via GPO

August 21, 2011 Added by:Rob Fuller

Also known as "How to practice what we preach". I don't know how long I've been telling clients that they need to have a minimum password length of 15 characters so there is no chance LM will be stored. But I've never tried setting it myself. Well, a client called me out. You can't...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Mobile Application Settles With FTC on COPPA Violations

August 21, 2011 Added by:David Navetta

The FTC alleged that the company’s apps were directed to children and that the applications therefore violated COPPA and the FTC’s COPPA Rule by collecting and disclosing personal information from children without their parents’ prior consent...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Compensation Increases for CIOs and IT Workers in 2011

August 20, 2011 Added by:Bill Gerneglia

According to the first-half 2011 IT salary survey from Janco Associates, IT compensation has increased slightly. While overall employment remains lackluster by most organizations across all industries, there is comfort in the fact that more tech jobs are being added than are being cut...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Foundstone Ultimate Hacking Training Course Discount

August 19, 2011 Added by:Infosec Island Admin

Leaving your network vulnerable to exploits can be catastrophic. Learning how hackers and malicious intruders analyze and target your assets can give you a serious advantage in today's high-tech world. Learn how to assess, penetrate, and secure UNIX and Windows networks and hosts...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Here's a Tip for Your Waitress: Don't Rip Me Off

August 19, 2011 Added by:Kelly Colgan

A Florida waitress used a skimmer to steal their credit card information, make new cards and rack up thousands of dollars in charges at Radio Shack and Walmart—all on their dime. The 25-year-old told authorities she targeted customers who she thought treated her poorly by running her around...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Facebook Releases User Security Guide

August 19, 2011 Added by:Headlines

The guide offers some fairly good advice and illustrative graphics on how to spot common scams and other mischief. It is written in simple enough terms that you, your kids, and your grandparents can all increase your Facebook security outlook a great deal in a matter of only a few minutes...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Identity Theft Has Long Lasting Psychological Effects

August 19, 2011 Added by:Robert Siciliano

The lack of specifics makes it difficult for victims to attain any closure and move forward. “No matter how well they monitor their financial records for the rest of their lives, they may still feel vulnerable,” Van Vliet says...

Comments  (0)


« First < Previous | 292 - 293 - 294 - 295 - 296 | Next > Last »