Blog Posts Tagged with "FUD"
Cybersecurity, Scare Tactics, and Sacrificing Privacy
July 13, 2012 Added by:Electronic Frontier Foundation
Efforts to break the partisan stalemate over the Cybersecurity Act, a bill that would allow Internet companies to monitor the communications of users and pass that data to the government without any judicial oversight, have backers of the bill attempting to drum up fears about catastrophic cyberattacks...
Comments (0)
Security Factions: Roosters and Owls
July 11, 2012 Added by:Infosec Island Admin
We have lobbying going on between two factions and all too often, the roosters are the ones being heard with their cry that the apocalypse is upon us, our water supply has been hacked, our power grid is a spiders thread away from utter collapse and youu my friend, are about to be plunged back into a zombie apocalypse...
Comments (1)
Security Vendors: Absit Reverentia Vero
July 09, 2012 Added by:
Vendors are driven to sell and sell at all costs. Product features stagnate, services under perform. We the customers suffer and the security postures of all organizations plummets. Adversaries can spend less on penetration innovation while at the same time more easily bypass our defenses...
Comments (0)
Security Slide Rules
June 29, 2012 Added by:Wendy Nather
First off, there must be a slide talking about The Problem We All Face and that it’s a scary, scary world out there, otherwise I would forget why we’re all here. Next, there must be a slide that includes icons of people, the cloudernet, and either monitors or CPUs. Extra points for creatively drawn bad guys...
Comments (0)
Talking to Your Management Rationally About Malware
June 28, 2012 Added by:Brent Huston
Malware with comparisons to Stuxnet are all the rage these days. Much of what is in the media is either hysteria, hype, confusion or outright wrong. As an infosec practitioner, your job is to explain to folks in a rational way about the trends and topics in the news carefully, truthfully, and rationally...
Comments (0)
Are Enterprises Really Hacking the Hackers?
June 27, 2012 Added by:Rafal Los
Active defense is using technology which can confuse an attacker, mislead them into spending time on worthless parts of an application, or slowing the response rate of the network or application down. That's active defense. Striking back involves actually going on the offensive, which is likely highly illegal...
Comments (1)
Sabu: The Anonymous Zeitgeist?
June 27, 2012 Added by:Infosec Island Admin
If Sabu was so loved by anonymous and approved of, then they have completely abdicated their core beliefs in operations and set themselves up for the fall that came with Sabu’s arrest and subsequent rolling over on everyone in the “movement” that have spawned all of the arrests we are now seeing come to trial...
Comments (2)
Tweeting About Cyberwar and Other Ridiculous Ideas
June 19, 2012 Added by:Infosec Island Admin
I have said this before and I am saying it again, we are just monkeys with digital guns. Fools with tools really. I am afraid of the level of hubris here and frankly feel that it’s almost time to just become a Luddite. At least Luddites won’t be compromised by their toasters because China made malware to p0wn us...
Comments (2)
Is There Such a Thing as Too Much Security?
June 18, 2012 Added by:Lee Munson
People who are in the computer security business are using too many scare tactics. Instead of informing the customer properly they are trying to scare them into using the company’s products. That is never a good thing and it is the reason why we have so much of a backlash going on now...
Comments (2)
Flame: Cutting Through Media and SME Hype
June 14, 2012 Added by:J. Oquendo
Flame is a very loud piece of malware. It is a horrendous 20Mb contraption which screams: "look at me." Many of the components in Flame are borrowed, re-hashed, re-written and re-deployed. AV companies are suggesting there is "no financial gain" being sought by Flame and to that I state: "How would you know?"
Comments (0)
The Fear Factor in Information Security
June 13, 2012 Added by:DHANANJAY ROKDE
Vendors are increasingly using the fear factor and coarse tactics to pressure information security managers into deploying rather unnecessary technologies and products. Why have we never heard of a vendor pitch claiming responsibility of failure to protect a company’s infrastructure?
Comments (0)
Flame On: Cry Havoc and Let Loose the Dogs of Cyberfoolery
June 08, 2012 Added by:Infosec Island Admin
It is comical that there are calls in the Senate to investigate the “leaks and leakers” who talked to Sanger about their digital daring do Stuxnet. All you really need to do Mr. Senator is walk up to 1600 Pennsylvania Ave and knock on the oval office door. You can find the leaker there I can assure you...
Comments (2)
The Myth of the CIA and the Trans-Siberian Pipeline Explosion
June 07, 2012 Added by:Jeffrey Carr
If you repeat a rumor often enough, it becomes a fact. Such is the case with the oft-repeated rumor the CIA was responsible for the Trans-Siberian pipeline explosion in 1982 by sabotaging the SCADA system. The latest iteration of that rumor was in the Washington Post's special report on cybersecurity called Zero Day...
Comments (0)
Google's Worst Security Idea Ever
June 06, 2012 Added by:Jeffrey Carr
Google announced that it will notify a subset of its Gmail customers if they're the victim of a State-sponsored attack. Google's advice is FUD-inducing for people who aren't targets and insufficient for those who are. I have to wonder what Google was thinking when it created this awful program...
Comments (0)
Flamer: I Can Haz Propaganda...
May 31, 2012 Added by:J. Oquendo
Studies on malware by vendors are not being done for anything other than being able to state: "We can defend you from MalwareX if you purchase Product Y." This is the reality of it. What better mechanism to do so than to paint the boogeyman as a rogue country. After all, countries spend millions on security...
Comments (0)
The Next War on Terror Will Be (Lost) Online
May 31, 2012 Added by:Ali-Reza Anghaie
Consider we might be putting our cyber soldiers on the wrong line. Sure, there are growing ranks of cyber counter-terrorism practitioners across both private and public space, except that's only to meet the enemy we really want to see - the one that suits perhaps what we're comfortable doing or getting funding for...
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization