Blog Posts Tagged with "Network Security"
July 25, 2011 Added by:Dawn Hopper
One scenario in which asymmetric routing of packets is frequently seen is with topologies designed for load balancing. The unintended consequence of this behavior would be connectivity problems due to dropped packets not matching the device state table...
July 24, 2011 Added by:J. Oquendo
I am not trying to write a scathing review, I am basing my review on experience.. I have used Wireshark since it was created in 1998 when it was called Ethereal. I have used both Wireshark and Omnipeek every single day for over a decade...
July 22, 2011 Added by:Headlines
In what could best be described as a proclamation reminiscent of Eisenhower's admonition of the powerful "military industrial complex", outgoing Federal CIO Vivek Kundra issued statements warning of security risks compounded by "an IT cartel" of vendors perpetuating big contract boondoggles...
July 22, 2011 Added by:Headlines
''Stealing is stealing whether you use a computer command or a crowbar, and whether you take documents, data or dollars. It is equally harmful to the victim whether you sell what you have stolen or give it away," said U.S. Attorney Carmen Ortiz...
July 21, 2011 Added by:Mike Meikle
Systems and software are designed by humans and there will be flaws that can be exploited. Plus, social engineering will always provide a path to compromising the most secure systems due to the fallibility of the human element. Legislation will not address these factors...
July 20, 2011 Added by:Vulcan Mindm3ld
Defenders are bound by a set of process and procedures. An organization’s inflexibility in deviating from them compound the problems. Many changes are often rejected on the basis of economic concerns. The majority are focusing on useless security guidelines such as the DISA PDI GEN001280...
July 19, 2011 Added by:Dawn Hopper
The value of the normalizer with inline mode cannot be overstated; it can reassemble entire fragmented streams as well as modify packets with illegal and/or malformed options before they reach their target. Not surprisingly, some technical documents refer to this function as packet scrubbing...
July 18, 2011 Added by:Headlines
Nearly two weeks after an Advanced Persistent Threat (APT) attack caused officials to take systems offline at the Energy Department’s Pacific Northwest National Laboratory (PNNL), nearly all systems have been restored to normal operating parameters...
July 16, 2011 Added by:Headlines
Reuters reports that a classified US military weapons system will now need to be redesigned after specs and plans for the system were stolen from a defense contractor database in a breach earlier this year...
July 14, 2011 Added by:Rafal Los
Let's face it - these groups are unpredictable. They will take up causes on a whim as seen with LulzSec, who were taking suggestions on what cause or organization to go after next. If you're sitting staring at an IDS/IPS console somewhere, this should send shivers down your spine...
July 14, 2011 Added by:Headlines
"Monsanto experienced a disruption to our Web sites which appeared to be organized by a cyber-group. In addition, this group also recently published publicly available information on approximately 2,500 individuals involved in the broader global agriculture industry..."
July 13, 2011 Added by:Rob Fuller
One of the down sides of that payload is you need to host the binary, giving up an IP/host that can be blocked. Well, Google recently allowed people to upload 'anything' to Google docs. You probably already see where I'm going with this...
July 13, 2011 Added by:Chris Blask
Physical security and industrial process data is correlated with real time situational awareness of cyber assets to produce constant visibility. Join this free webinar to explore the efficiency and ease of use of AlienVault ICS SIEM...
July 12, 2011 Added by:Headlines
Department of Homeland security officials are warning of weaknesses in the technology supply chain that result in the importation of devices that are already infected with malware, spyware, backdoors and other malicious code that leave the units vulnerable to exploitation...
July 08, 2011 Added by:Dan Dieterle
This process works on a fully patched and updated Windows 7 system. When I checked it last year, it also worked on all of Windows server products. Windows protects these system files from being modified when Windows is booted, but booting in Linux to alter them just takes a couple minutes at most...
July 07, 2011 Added by:Dawn Hopper
This first part of a two-part series will deal with Application Inspection and Control, sometimes referred to as DPI or Deep Packet Inspection. Rather than give detailed commands, this will serve as a high-level comparison...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013