Blog Posts Tagged with "FUD"


Getting Smacked in the Face Over TCP

November 21, 2011 Added by:Robin Jackson

Those who see concerted nation-state cyber attacks in every compromised system are like the little boy who cried "Stuxnet" whenever a control system is hacked and those who poo-poo the vulnerabilities that come to light are like the little pig who built his house of straw and said "I'm safe"...

Comments  (0)


The FUD Files: Cyber Attacks on Our Water Systems

November 20, 2011 Added by:Infosec Island Admin

Sure, the vulnerable system was online for anyone to hit up AND it was in such an un-secured state that pretty much anyone with a pulse could have messed with it. However, The FUD response from the government and the media will be the real disaster that will cause the most damage...

Comments  (1)


Neuromancing The Cyberwars

November 17, 2011 Added by:Infosec Island Admin

It’s pretty damned hard to determine who did what and where on the net. Digital forensics only gets you so far - compromised machines can be tampered with in so many ways to make it look like someone did something, and these guys want to launch cruise missiles against nation states over a DDoS?

Comments  (1)


INFOPOCALYPSE: You Can Lead Them to the Security Trough...

November 08, 2011 Added by:Infosec Island Admin

We have seen this from the perspective of magic boxes that promise to negate security vulnerabilities as well as teams of consultants who will “securitize” the company. The net effect is that those paying for such products and services may as well be buying a handful of magic beans instead...

Comments  (0)


SecBiz -- Who will be Infosec's Pariah?

November 07, 2011 Added by:Ali-Reza Anghaie

Infosec has become overrun with FUD. We're on the verge of bottoming-out and reconstructing our collective industry souls. The next three years will be exciting times for our industry. And the first major breakthrough will be finding our pariahs...

Comments  (5)


On Infosec and Drugs

November 06, 2011 Added by:Javvad Malik

The report fails to clearly define is what is cybercrime. It appears as if everything from someone giving away their credit card information to a stranger via email through to getting infected by a virus on the computer is all scooped up into the big bucket of cybercrime...

Comments  (0)


Challenge for CISOs - Getting Beyond the Shiny Features

November 02, 2011 Added by:Rafal Los

From a CISO perspective, listen to the pitches the vendors give you... listen to the basis for the solutions you're being asked to spend money on. Lately it has been about 2 things: FUD primarily (that's Fear, Uncertainty, Doubt) and features secondarily. What's wrong with that?

Comments  (1)


The Son of Stuxnet? Methinks the Cart be Before Ye Horse

October 19, 2011 Added by:Infosec Island Admin

And therein lies the rub. DUQU has a 36 day shelf life. Now, this is good from a foot-printing level AND could be excellent for setting up the next attack vector that could include the component of sustained access. It was a recon mission and that was all...

Comments  (0)


Stuxnet, SCADA, Nation State Terrorism and FUD

October 13, 2011 Added by:Infosec Island Admin

With the advent of the “smart” grid, this might in fact make it easier to have a larger percentage of failure within the system itself. Everything being tied together this way and monitored will only serve to make the system more susceptible to a single point of failure...

Comments  (2)


Anonymous, Wall Street and Disinformation

October 06, 2011 Added by:Infosec Island Admin

FUD is a great motivator, and an attack on the NYSE or NYNEX, or any of the players here could have ripples later on. Those ripples would come in the form of people selling off their stocks, companies and corporations as well, and the net effect could potentially be large losses in the market...

Comments  (0)


Strutting and Fretting Upon the Security Stage: The Players

September 16, 2011 Added by:Infosec Island Admin

There will always be elements within the company with impetus to not take your advice on security matters and maybe even give you a large amount of pushback. This is especially true of any company that has little to no security posture to start with. So who are the key client players?

Comments  (1)


Strutting and Fretting Upon the Security Stage: Intro

September 14, 2011 Added by:Infosec Island Admin

I have heard others lament the state of the “security industry” and have posted about my own adventures in the land of FUD and Security Theater as well as a side trip into the lands of denial. My goal with this series is to cover the players, the game, and the realities of the security business...

Comments  (4)


Experts Debate Merits of McAfee's Shady Rat Report

August 30, 2011 Added by:Headlines

"We consider those conclusions to be largely unfounded and not a good measure of the real threat level. Also, we cannot concede that the McAfee analyst was not aware of the groundlessness of the conclusions, leading us to being able to flag the report as alarmist," Eugene Kaspersky said...

Comments  (0)


On Romulan Ale and Bird of Prey Malware

July 20, 2011 Added by:Vulcan Mindm3ld

Defenders are bound by a set of process and procedures. An organization’s inflexibility in deviating from them compound the problems. Many changes are often rejected on the basis of economic concerns. The majority are focusing on useless security guidelines such as the DISA PDI GEN001280...

Comments  (2)


The Benefits of FUD

July 06, 2011 Added by:Emmett Jorgensen

Fear, Uncertainty, and Doubt. Enemy of skeptic IT Pros, ally of marketers. Why do infosec pros talk about FUD in a negative light? Granted, some vendors push the FUD aspects of their marketing a bit too much. However, I think a little FUD can be a healthy thing. Let me explain...

Comments  (4)


Lack of Attribution Undermines Clarke's China Warning

June 19, 2011 Added by:J. Oquendo

Richard Clarke should take from the lessons learned via Iraq: Not everything is what it seems. When it comes to a cyber intrusion, all anyone can ever claim is that a computer from "some country" was the source of the attack. The reality is, the attacker could be anyone in the world....

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »