Latest Posts

4c1c5119b03285e3f64bd83a8f9dfeec

On Definitions – Keeping it Simple with OSSM

September 21, 2011 Added by:Ben Kepes

Spending so much time in the rarefied atmosphere of the twitterverse, it’s easy to assume that everyone “gets it”. The truth is somewhat different – the vast majority of people out there are still coming to terms. For them the Cloud is an unheard of concept and unexplained territory...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Dutch Team European Champs for Global CyberLympics

September 21, 2011 Added by:Headlines

“CyberLympics presents a unique set of challenges that puts competing teams through a real life environment which include offensive hacking strategies but also deploying defensive capabilities to prevent being hacked. This approach makes the CyberLympics stand out..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

Signals of PC Failure and Contingency Plans

September 21, 2011 Added by:Robert Siciliano

Has your computer refused to turn on? Or turned on, but only to display a blue screen? The worst is when you’ve been working on a document and your hard drive crashes. If this has yet to happen to you, you’re likely overdue. The following are signs your computer may be close to death...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Western Companies in Collusion with Chinese Oppression

September 21, 2011 Added by:Headlines

"Entering into the Chinese market as a search engine or social media provider is an ethical mine field. In the hands of authorities determined to police their subjects, search engines and social media platforms such as Facebook can become a potent tool of online repression..."

Comments  (0)

8b5e0b54dfecaa052afa016cd32b9837

IPv6: The End of Security As We Know It

September 21, 2011 Added by:Craig S Wright

People have seen IPv6 as a simple addressing extension to the existing internet and see few changes to the way we secure systems. These people cannot be further from the truth. IPv6 will change the way we think about security. We need to start planning now or we will be left in the dust...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Webinar: Cybersecurity for Electrical Cooperatives

September 21, 2011 Added by:Infosec Island Admin

Free Webinar: NESCO is charged by the DoE with providing information on collaboration, tactical awareness, rapid notification, forensics and applied research. Steve Parker, NESCO Lead, will be hosting the session along with AlienVault's Chris Blask and Trusted Metrics' Michael Menefee...

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

Cloud Computing Solutions in Federal Agencies part 2

September 20, 2011 Added by:Kevin L. Jackson

Cloud outages can be a potential risk—and can have widespread implications for consumers of cloud services. This risk becomes even more severe if a mission-critical environment could be impacted. Security concerns have also slowed the widespread adoption of cloud computing...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Compliance Champions: People Solving Problems

September 20, 2011 Added by:Thomas Fox

One of the goals of such a Compliance Champion program is to train employees to be your first line of compliance people on the ground, both to respond to routine queries and to alert the Legal/Compliance Department if a problem needs to be escalated...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Anonymous: Insidiae, Psychologia, Et Liber Pericula

September 20, 2011 Added by:Infosec Island Admin

Collectively, groups like Anonymous can manifest a sociopathic or psychopathic potential in certain circumstances. In the case of the actions of Anonymous actors online in their dialogues and statements, they manifest key features of what is considered psychopathic behaviors...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Scammers Exploiting Bogus DigiNotar SSL Certificates

September 20, 2011 Added by:Headlines

Security provider Barracuda Networks has warned of a spamming campaign targeting Royal Bank of Canada customers. The spam messages falsely notify users that their SSL certificate has expired, and that in order to continue using online banking services they are required to update the certificate...

Comments  (0)

8b5e0b54dfecaa052afa016cd32b9837

What the Law Says about Distributing a Virus or Malware

September 20, 2011 Added by:Craig S Wright

It is probable a service provider or content hosting entity will face a degree of liability dependent on intention. If malware is intentionally posted such as in the Morris’ case, no uncertainty as to whether the conception and insertion of the malware was deliberate exists...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Guidelines: Security Content Automation Protocols

September 20, 2011 Added by:Headlines

Bringing order and security to the patchwork quilt of computing environments in a large organization can be a daunting task. NIST recently released four new publications that detail specifications to be used by the latest version of the Security Content Automation Protocol (SCAP)...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DigiNotar Files for Bankruptcy Following Security Lapse

September 20, 2011 Added by:Headlines

DigiNotar has filed a voluntary bankruptcy petition following a serious breach of security. “We are working to quantify the damages caused by the hacker’s intrusion into DigiNotar’s system and will provide an estimate of the range of losses as soon as possible..."

Comments  (0)

959779642e6e758563e80b5d83150a9f

Will Security Turn into a B2B Industry?

September 19, 2011 Added by:Danny Lieberman

As businesses become more and more interconnected, as cloud services percolate deeper and deeper into organizations, and as government compliance regulation becomes more complex and pervasive, the security “problem” becomes more difficult to solve and even harder to sell...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Information Warfare Directory

September 19, 2011 Added by:Joel Harding

There are literally tons of websites out there dealing with information warfare, information operations, psychological warfare, military information support operations and a myriad of topics. This website is not bad, not bad at all, it’s just not good....

Comments  (1)

44fa7dab2a22dc03b6a1de4a35b7834a

Federal CIO Salaries Lag - Leads to Turnover

September 19, 2011 Added by:Bill Gerneglia

It’s more than just a salary cut. Officials working for private companies also get bonuses, stock options and a better benefits package than those working in the public sector. So who in their right mind would tolerate the smaller paycheck in exchange for a bunch of headaches?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

A Primer on Situational Awareness

September 19, 2011 Added by:Infosec Island Admin

Situational Awareness is a part of OPSEC, in fact, I would dare to say that it is the basic core of OPSEC. If you don’t know the variables of danger in your environment and you are not paying attention, then, well you get hacked in IT and in real life situations, you get dead potentially...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researcher Discovers New SCADA Vulnerabilities

September 19, 2011 Added by:Headlines

"Finding zero-day (previously unknown holes) in SCADA software is like nuking fish in a barrel. People purchasing these systems need to push back on suppliers and ask them what they are doing to secure the system before selling it to customers," said Chris Wysopal, CTO for Veracode...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Chinese Security Firm Discovers BIOS Based Virus

September 19, 2011 Added by:Dan Dieterle

When a system is infected, the trojan checks to see if the system has an Award Bios. If it does, it hooks itself to the BIOS. Once the system is restarted, it adds itself to the hard drive’s master boot record (MBR). Next it infects the winlogon.exe or winnt.exe system files...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Hacker Halted Conference and Training Giveaway

September 19, 2011 Added by:Infosec Island Admin

We have lined up more than 70 speakers for this year's event, and designed a comprehensive agenda covering major topics in information security across 4 dedicated tracks. Receive a free iPad and 2 nights accommodations when you sign up for selected training or conference pass...

Comments  (0)