Social Media Monitoring: A Rubric for Control

February 21, 2012 Added by:Infosec Island Admin

We have become a watched commodity via all means of communication. Programs have been put together with the veneer of protecting us from another 9/11 and perhaps some of them were made with the best of intentions, but this idea of monitoring social media is half baked...

Comments  (2)


We Have Every Right to be Furious about ACTA

February 13, 2012 Added by:Electronic Frontier Foundation

While ACTA was only negotiated between a few countries, it has global consequences. First because it will create new rules for the Internet, and second because its standards will be applied to other countries through the U.S.’s annual Special 301 process...

Comments  (0)


Smart Grid Raises the Bar for Disaster Recovery

February 13, 2012 Added by:Brent Huston

Many of the organizations we have talked to simply have not begun the process of adjusting their risk assessments, disaster plans and the like for these types of operational requirements, even as smart grid devices begin to proliferate across the US and global infrastructures...

Comments  (0)


Department of Justice Misdirection on Cloud Computing

February 08, 2012 Added by:Electronic Frontier Foundation

The DOJ has been unequivocal that cloud users have no right to challenge government access to "non-content" information held by Cloud systems - their location, their contacts, their communications patterns and more. Lawyers call this the "third party problem"...

Comments  (0)


Hidebound Governments Unprepared for Cyber Threats

February 05, 2012 Added by:James Colbert

“Even if they brilliantly secure their networks, the greatest threat that organizations face is that they are still vulnerable if their minimum wage security guards are disgruntled or their physical access control systems can be easily bypassed...”

Comments  (0)


A Conversation With Richard Clarke – Part II

February 04, 2012 Added by:Fergal Glynn

Chris Wysopal and cyber security expert Richard Clarke continue their discussion on the changing cyber threat environment, the evolving cyber legislation landscape, and steps you can take to strengthen your organization’s resilience...

Comments  (1)


A Conversation with Richard Clarke – Part I

January 31, 2012 Added by:Fergal Glynn

Chris Wysopal and internationally-renowned cyber security expert Richard Clarke discuss the changing cyber threat environment, the evolving cyber legislation landscape, and steps you can take to strengthen your organization’s resilience...

Comments  (0)


Evidence of Chinese Attacks on US Defense Contractors

January 30, 2012 Added by:Pierluigi Paganini

At least six Chinese IP addresses were used to proxy or host the command and control servers. The Netbox webserver is mainly used by those who speak Chinese. In fact, all the documentation to setup and learn the framework is only available in Mandarin...

Comments  (0)


The Implications of Malware-as-a-Service

January 25, 2012 Added by:Pierluigi Paganini

Criminal operations are managed as corporations and malware is designed as a service, with a maniacal attention paid to product quality. The life cycle is the most amazing aspect: From design, release, to after sales support - each stage is implemented with care and attention...

Comments  (0)


Roadmap to Exploitation: The OIG Imperative to Publish or Perish

January 23, 2012 Added by:

The majority of OIG organizations publish highly sensitive information as if they were assisting the agency. Just the opposite. They are ensuring a more rapid penetration of cyber defenses. Whose side of the equation here are you on? Why does this need to be public information?

Comments  (9)


Internet-Wide Protests Against the Blacklist Legislation

January 18, 2012 Added by:Electronic Frontier Foundation

The SOPA and PIPA blacklist bills are dangerous: if made into law, they would hamper innovation, kill jobs, wreak havoc on Internet security, and undermine the free speech principles upon which our country was founded...

Comments  (0)


First Documented Case of Cyber Espionage?

January 15, 2012 Added by:Richard Stiennon

Thanks to a hacker group in India, Infosec Island has source material that demonstrates wide spread cyber espionage on the part of the Indian Government which the hackers may publish. This is a historically significant development for those of us who track cyber espionage...

Comments  (12)


Exclusive: Indian Intelligence Infiltrated US Government Networks

January 10, 2012 Added by:Anthony M. Freed

Infosec Island received sixty-eight sets of usernames and passwords for compromised US government network accounts which “The Lords of Dharmaraja” said were acquired from servers belonging to India’s Ministry of External affairs and the National Informatics Centre...

Comments  (29)


Initiative to Protect the Electric Grid from Cyber Threats

January 09, 2012 Added by:Headlines

The project, a White House initiative led by the DOE in partnership with the DHS, will leverage private industry and public sector experts to build on existing cybersecurity strategies to create a more comprehensive and consistent approach to protecting the nation’s energy delivery system...

Comments  (0)


NSA Launches CryptoChallenge Mobile Application

December 22, 2011 Added by:Headlines

The game is the latest digital communications effort designed to educate young adults on career opportunities with NSA and recruit the best and brightest to support NSA's cybersecurity initiatives...

Comments  (0)


ENISA Report on Maritime Cyber Security

December 20, 2011 Added by:Stefano Mele

Due to the high complexity, it is major challenge to ensure adequate maritime cyber security. Development of good practices for the technology development and implementation of ICT systems would therefore ensure “security by design” for all critical maritime ICT components...

Comments  (0)

Page « < 6 - 7 - 8 - 9 - 10 > »