August 19, 2014 Added by:Patrick Oliver Graf
If awards were given out at Black Hat 2014, one nominee for “Exploit of the Conference” would have won in a runaway – the “BadUSB” exploit.
August 14, 2014 Added by:Patrick Oliver Graf
It’s Groundhog Day all over again for retailers, following the U.S. Department of Homeland Security’s warning that they could, once again, be exploited by malicious actors.
August 13, 2014 Added by:Joe Weiss
There is still a prevailing view that control system cyber security is not real and the cost of addressing it is not commensurate with the 'benefits'.
August 11, 2014 Added by:Patrick Oliver Graf
During wartime, information can create just as much of an advantage for one side as the size of an army or the weapons they hold. That is, as long as this information is accurate, passed along to the right people and then acted upon quickly.
August 07, 2014 Added by:Anton Chuvakin
As I’ve written many times, SIEM is a “force multiplier”, but this definition implies that you have something to multiply. If you have 0 capabilities, a purchase of a SIEM tool will still leave you at – you guessed it!—0.
August 07, 2014 Added by:Joe Weiss
As with the other papers, the paper chairs reflect the upper strata in political Washington. Unfortunately, like the other papers, there is a lack of control system expertise that has been applied even though I was told more than 200 people worked on the paper.
August 06, 2014 Added by:Dan Dieterle
Recently I was talking with a Retail Point of Sale (POS) software expert and was told how a POS system was hacked by an attacker that had gained access to the network through a video security system.
July 31, 2014 Added by:Cyphort
Since the first report on Havex RAT’s involvement with Industrial Control Systems (ICS) emerged last month, ICS operators were reminded to what extent malware authors will go to intrude their systems.
July 31, 2014 Added by:Identropy
The most difficult hurdle to get over can be coming to terms with the fact that the selected solution is not delivering the expected value and deciding to move forward in search of a new solution.
July 30, 2014 Added by:Joe Weiss
My database of actual ICS cyber incidents is >350 and growing. I certainly hope people wake up before it is too late.
July 29, 2014 Added by:Neohapsis
Multipath TCP: Breaking Today’s networks with Tomorrow’s Protocols. is being presented at Blackhat USA this year by Me (Catherine Pearce @secvalve) as well as Patrick Thomas @coffeetocode. Here is a bit of a tease, it’s a couple of weeks out yet, but we’re really looking forward to it.
July 29, 2014 Added by:Rafal Los
Security is fraught with the ad-hoc approach. Some would argue that the very nature of what we do in the Information Security industry necessitates a level of ad-hoc-ness and that to try and get away from it entirely is foolish.
July 24, 2014 Added by:Ali Golshan
We recently noticed a surge where exploit packs are served from DMO (Destination Marketing Organization) websites using an Ad network called simpleviewinc.com during the July 4th long weekend.
Compliance and Security Trends... akikah tangerang on 09-19-2014
Carberp Botnet Lifecycle Infographic... akikah tangerang on 09-19-2014
The Benefits of FUD... akikah tangerang on 09-19-2014