Blog Posts Tagged with "Analysis"

7fef78c47060974e0b8392e305f0daf0

The Subtle Art of OSINT: Open-Source Intelligence

January 11, 2012 Added by:Infosec Island Admin

The use of OSINT has grown. Earlier on, these sources of information that were being culled and combed through by the likes of Langley, now can be easily done by the likes of you and I with a few tools on the web or applications that you can install on your machines at home...

Comments  (1)

Fe3139b2aae983885565da7757da08a8

Chrome Most Secure? Depends on Your Frame of Reference

December 21, 2011 Added by:Ed Moyle

Until recently Chrome supported SSL 2.0 by default (seems like a major no-no in my humble opinion) and the fact that Firefox is the only one of the big three to have OCSP checking enabled by default. This aspect of "browsing security" is a "score one" for Firefox in my estimation...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Duqu Malware Authors Display Sense of Humor

November 14, 2011 Added by:Headlines

"This is another prank pulled by the Duqu authors, since Showtime Inc. is the cable broadcasting company behind the TV series Dexter, about a CSI doctor who happens also to be a serial killer who avenges criminals in some post-modern perversion of Charles Bronson’s character in Death Wish..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Memory Forensics: How to Capture Memory for Analysis

November 10, 2011 Added by:Dan Dieterle

Analysts use memory dumps to analyze malicious software. Once you have the memory dump, you can perform some very interesting analysis on it, like viewing what processes and programs were running on the machine, and what network connections the system had. You can even pull passwords from them...

Comments  (2)

C9f10ffa24531c96d85e0445499fd1e4

Browser-Based Malware: Decoding a PHP Backdoor

October 20, 2011 Added by:john melvin

This article is not an analysis of the backdoor, but instead describes the methodology and techniques used to decipher malicious code embedded and encoded in a seemingly normal web page. The following is a snippet of the PHP code that caught my attention and began my investigation...

Comments  (1)

850c7a8a30fa40cf01a9db756b49155a

Re-Analyzing Cyberdeterrence and Cyberwarfare

May 15, 2011 Added by:J. Oquendo

Military commanders and generals responsible for strategies could spend hours re-analyzing how their locations are constantly being exposed. Money down the drain. Soldiers may even be injured as a result or even worse loss of life. All the while the vulnerability existed from something as simple as an iPad or a mobile phone...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Analysis Shows Firewalls Fail to Deliver as Promised

April 12, 2011 Added by:Headlines

Three of the six firewalls failed to stay operational when subjected to stability tests, five out of six didn't handle what is known as the Sneak ACK attack. According to NSS Labs, the performance claims presented in the vendor datasheets are generally grossly overstated...

Comments  (2)

Ebb72d4bfba370aecb29bc7519c9dac2

Open Source Log Management Tools List

April 08, 2011 Added by:Anton Chuvakin

This page lists a few popular free open-source log management and log analysis tools. The log cheat sheet presents a checklist for reviewing critical system, network and security logs when responding to a security incident. It can also be used for routine periodic log review...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Cyber Warfare Decomposition... Fail

March 23, 2011 Added by:J. Oquendo

Administrators and engineers can and should take an altogether different approach to security. We may never be able to stop random attackers from knocking on our door, we can however stop answering the door. This is another failure from security management right on down to the engineering level...

Comments  (2)

850c7a8a30fa40cf01a9db756b49155a

Cyber Warfare Analysis - You're Doing It Wrong

March 14, 2011 Added by:J. Oquendo

Forget about what is coming into and what is leaving your network. The goal: Quit trying to get people to STOP knocking on your door, focus on getting your people to stop wasting time and resources in ANSWERING the door when they know by this point in time there will be no-one there...

Comments  (2)

Page « < 1 - 2 - 3 - 4 > »