Latest Posts

F29746c6cb299c1755e4087e6126a816

Teen Tips for a Safe Cyber Summer

August 13, 2011 Added by:Kelly Colgan

Parents can’t supervise their teens around the clock. So how can you protect your fiercely independent, world-weary, tech-savvy teen—the one with the bad case of selective hearing—from trouble online? Let us do the talking with these tips...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Anonymous Conspiracies That Never Materialize

August 12, 2011 Added by:Infosec Island Admin

Data dumps without context have no real intelligence worth. While this stuff is interesting, it’s certainly not earth shattering. What’s worse is that it makes you all look more and more like the boy who cried wolf than the Deep Throat. This is why I keep harping on Anonymous...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Casey Jones - or How to Stop a Compliance Train Wreck

August 12, 2011 Added by:Thomas Fox

The evaluation of C-Suite leadership can be problematic in the best of times. The C-Suite can be an active part of the problem. While not FCPA violations, the criminal prosecutions at the highest echelon at Enron, WorldCom and Adelphia certainly speak to ethical lapses at the top...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Man Gets Eighteen Years for Hacking Neighbors

August 12, 2011 Added by:Robert Siciliano

In Minnesota prosecutors put away a “depraved criminal” for 18 years as a result of virtually torturing his neighbors via their Wi-Fi connection. After a brief encounter with his new neighbors he began “a calculated campaign to terrorize his neighbors”...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

LinkedIn Ceases Using Member Profiles for Advertising

August 12, 2011 Added by:Headlines

LinkedIn has pulled a one-eighty after receiving overwhelming criticism for using member profiles, images and activity in an advertising campaign. The brunt of the criticism was the decision to "opt-in" members for participation automatically without first getting their expressed permission...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

White House Hires Former Microsoft Exec as Federal CIO

August 12, 2011 Added by:Bill Gerneglia

The White House has named a new Chief Information Officer to succeed Vivek Kundra. Former Microsoft executive Steven VanRoekel, an Obama supporter who attended the inauguration, will become the next Chief Information Officer of the federal government...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Don't Miss Security BSides in Los Angeles

August 12, 2011 Added by:Headlines

This is a community event - for all of us, by all of us. In exchange for it being a free event, you will be encouraged to be active. Come and talk, speak up, ask questions and participate throughout the event. It is a time for all of us to learn, share and explore without judgment, and con-fees...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

PCI Compliance and Tokenization

August 12, 2011 Added by:PCI Guru

Tokenization does not imply encryption. However, encryption may be used for tokenization as can one-way hashing. When encryption is used as a way to tokenize sensitive information, the system receiving the token never has the capability to decrypt the token...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Certified Ethical Hacker v7 Training Course Discount

August 12, 2011 Added by:Infosec Island Admin

Receive up to a $500 discount on the Certified Ethical Hacker v7 course offered by Global Knowledge through the ISLAND TRADEWINDS program - Prepare for the CEH certification while learning the latest ethical hacking techniques...

Comments  (0)

A08e32d2f9a8b78894d964ec7fd4172e

Black Hat OSPF Vulnerabilities: Much Ado about Nothing

August 11, 2011 Added by:Stefan Fouant

There is some merit to what these researchers have found and to a protocol junkie like myself. However, what they've completely overlooked is the first tenet of information security which is to ensure the physical environment is properly secured...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Ghost in the Wires: The World's Most Wanted Hacker

August 11, 2011 Added by:Ben Rothke

The myth of Kevin Mitnick still haunts many people. But the myth is all we’ve had till now. This memoir gives us finally the man, whose adventures as the worlds most wanted hacker, bring us to a very human view of the intersection of technology, business, law and security...

Comments  (2)

A8054e07abdfdcadb09322585cb2e085

BSidesLV and DEFCON 2011 Summary

August 11, 2011 Added by:Michael SecurityMoey

If you have never been to DEFCON there is no way to describe it that would do it justice. DEFCON is draws hackers, crackers, and Feds. The old staples were there such as the lock picking, hardware hacking, Wall of Sheep, sky talks, Mohawk con, etc. This year also had many firsts...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

UPDATE: Hong Kong Trading Halted by DDoS Attack

August 11, 2011 Added by:Headlines

Trading on Hong Kong’s stock market, Hong Kong Exchanges and Clearing, remains suspended today following a “coordinated and sustained” distributed denial of service attack on one of the exchange’s websites Wednesday...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

FINRA Fines Citigroup for Failing to Detect Fraud

August 11, 2011 Added by:Headlines

FINRA found that Citigroup failed to detect or investigate a series of "red flags" that upon further inquiry should have alerted the firm to the improper use of customer funds, including reports reflecting suspicious transfers of funds between unrelated accounts...

Comments  (1)

E973b16363b3de77b360563237df7e32

Information Gathering - Lessons from The Big Short

August 11, 2011 Added by:Bozidar Spirovski

Regardless of whether you need to collect information on a potential competitor, the target of a penetration test, for financial spread betting and derivatives trading, or even for financial research of a company there are several lessons that the "The Big Short" teaches us...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Congress Wants McAfee Briefing on Operation Shady Rat

August 11, 2011 Added by:Headlines

"If these intrusions can be classified as more 'unsophisticated' and 'opportunistic,' what is the threat of the more 'insidious' intrusions on which McAfee has focused in recent years? How can we effectively prevent or mitigate these more insidious intrusions?"

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Majority of Bankers Say Cyber Crime is Uncontrollable

August 11, 2011 Added by:Headlines

The results of a live poll conducted at its annual North American Insights client conference show fraud and cyber crime continue to be among the most daunting issues that banks are facing today. Bankers believe it is a challenge that they will never be able to get under control...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Ivan Ristic - Director of Engineering - Qualys

August 10, 2011

Ivan Ristic is the Director of Engineering at Qualys, and is a respected security expert and book author, known especially for his contribution to the web application firewall field and the development of ModSecurity, the open source web application firewall. He is the author of Apache Security...

Comments  (0)

A08e32d2f9a8b78894d964ec7fd4172e

Juniper SRX Tips: Altering Default Deny Behavior

August 10, 2011 Added by:Stefan Fouant

With just a couple of lines of code we can streamline the configuration, in this case creating an explicitly defined deny policy which logs all traffic that would otherwise be silently discarded. Best of all, we can do so without having to resort to manual configurations of each one...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Ten Password Tips that Never Go Out of Style

August 10, 2011 Added by:Allan Pratt, MBA

I know what you’re thinking: not another post about passwords. The truth is, no matter how many times those of us in the infosec arena talk, cajole, and plead with users to create complex passwords, they don’t follow directions. Instead, they come crying to us after something bad happens...

Comments  (9)