Blog Posts Tagged with "Intellectual Property"


Difference Between Spreading Information and Enabling Crime

February 14, 2012 Added by:Rafal Los

Most people don't get prosecuted or charged for distributing or re-tweeting a link to an Anonymous pastebin dump. Where is the line drawn then, and why are some incidents bigger than others? The question ultimately goes to the contents of the cache of information...

Comments  (2)


Four Keys for Intellectual Property Protection

February 07, 2012 Added by:Jason Clark

Intellectual property includes product designs, secret formulas, and other trade knowledge. It's what organized cybercrime, state governments and hackers are all going after. Why? Mostly because of the value. One stolen manufacturing process can be worth millions...

Comments  (1)


Data Loss Prevention Step 6: Encrypting Data at Rest

February 06, 2012 Added by:Rafal Los

Even if you did know where all your critical information is, you'd probably be powerless to control its sprawl. Let's face it, systems consume data and then become mobile - which is hardly something you can do anything about in a world where mobility is a key business driver...

Comments  (3)


Acts of Terrorism vs. Cyber Threats: New Offense Scenarios

February 02, 2012 Added by:Pierluigi Paganini

“I do not think today it is necessarily the number one threat, but it will be tomorrow... Counterterrorism... with the FBI is the present number one priority. But down the road, the cyberthreat, which cuts across all programs, will be the number one threat to the country...”

Comments  (0)


Data Loss Prevention Step 5: Disable Access to Cloud Storage Services

January 16, 2012 Added by:Rafal Los

This is part 5 in a series, and it's about pulling your data away from the clutches of the cloud. It's not all as crazy as that sounds though, because the cloud has real benefits, but it has to be approached with sanity rather than as the ostrich approaches the sandstorm...

Comments  (0)


Espionage, Cyberwar and Trans-National Cybercrime

January 11, 2012 Added by:Andrea Zapparoli Manzoni

Cyber-espionage, especially from the far east, has reached never seen before levels of sophistication and is now the world's primary cause of intellectual property theft. Some analyst are already stating that we just entered a new “Cold Cyberwar” age...

Comments  (0)


Serial Copyright Violations by 7Safe's

January 03, 2012 Added by:security curmudgeon

Infosec Media's aggregation does not honor fair use quoting, and does not respect copyright. For each article, the original title is left intact but the byline is stripped. This practice is not acceptable by any standards in journalism or information security...

Comments  (2)


SSAE 16 "First to Fail"?

December 27, 2011 Added by:david barton

So if First to File® is in the business of document management, how do their services have any relevance to a user entity’s financial statements? They are merely storing intellectual property (IP) in a web-based environment for their customers...

Comments  (0)


Handful of Chinese Hackers Responsible for Majority of Attacks

December 12, 2011 Added by:Headlines

"Right now we have the worst of worlds. If you want to attack me you can do it all you want, because I can't do anything about it. It's risk free, and you're willing to take almost any risk to come after me," said James Cartwright, a former vice chairman of the Joint Chiefs of Staff...

Comments  (0)


Plagiarism in IT Security - Walking a Fine Line

December 09, 2011 Added by:Rafal Los

At the end of the day, shouldn't we all be professionals? I know it's nice to think that everyone is honest - but as the infosec world expands and there is a massive influx of people trying to make a name for themselves - there will be dishonesty. This is where the community comes in...

Comments  (2)


NATO: Cybercrime Drains One Trillion Dollars from Economy Yearly

December 07, 2011 Added by:Headlines

"One trillion dollars disappears annually from the global economy because of cybercrime. Industrial secrets, copyright, intellectual property, state secrets become increasingly difficult to protect. Economies are running on these complex systems, which can be easily destroyed," Shea said...

Comments  (0)


U.S. Military Chief Warns of Economic Cyber Threat

December 01, 2011 Added by:Headlines

"We lose enormous intellectual property rights. We're under constant attack every day. And it's going to take a whole government approach," said General Martin Dempsey, Chairman of the Joint Chiefs of Staff...

Comments  (1)


Protecting and Promoting the UK in a Digital World

November 28, 2011 Added by:Headlines

"With greater openness, interconnection and dependency comes greater vulnerability. The threat to our national security from cyber attacks is real and growing. Organised criminals, terrorists, hostile states, and ‘hacktivists’ are all seeking to exploit cyber space to their own ends"...

Comments  (0)


Plagiarism is Bad - Oh Look, A New Song to Download...

November 27, 2011 Added by:Javvad Malik

I fully sided with Corelan in the fact that they have put effort into producing so much good quality material only for Infosec Institute to steal it and try to make a profit from it. I picked up my cyber pitchfork with every intention to storm the castle. However, I’ve been thinking...

Comments  (0)


Espionage: Protecting American Innovation in Cyberspace

November 23, 2011 Added by:Headlines

"The Chinese are aggressively hacking into our nation’s networks, threatening our critical infrastructure and stealing secrets worth millions of dollars in intellectual property... This jeopardizes our national security and hurts U.S. competitiveness in the world market..."

Comments  (0)

B8b580348b4e717042d0e394ee072001 Errata Project: Detecting Plagiarism

November 19, 2011 Added by:security curmudgeon

With the recent rash of plagiarism exposure, one of the most frequent questions we get is "how do you find plagiarism"? Our methodology is home-grown and very simple. We assume that we are only catching some of it, and that our methodology causes us to miss some. It isn't rocket science...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »