Latest Posts

A7290c5bd7bc2aaa7ea2b6c957ef639b

Mobile Application Settles With FTC on COPPA Violations

August 21, 2011 Added by:David Navetta

The FTC alleged that the company’s apps were directed to children and that the applications therefore violated COPPA and the FTC’s COPPA Rule by collecting and disclosing personal information from children without their parents’ prior consent...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Compensation Increases for CIOs and IT Workers in 2011

August 20, 2011 Added by:Bill Gerneglia

According to the first-half 2011 IT salary survey from Janco Associates, IT compensation has increased slightly. While overall employment remains lackluster by most organizations across all industries, there is comfort in the fact that more tech jobs are being added than are being cut...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Foundstone Ultimate Hacking Training Course Discount

August 19, 2011 Added by:Infosec Island Admin

Leaving your network vulnerable to exploits can be catastrophic. Learning how hackers and malicious intruders analyze and target your assets can give you a serious advantage in today's high-tech world. Learn how to assess, penetrate, and secure UNIX and Windows networks and hosts...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Here's a Tip for Your Waitress: Don't Rip Me Off

August 19, 2011 Added by:Kelly Colgan

A Florida waitress used a skimmer to steal their credit card information, make new cards and rack up thousands of dollars in charges at Radio Shack and Walmart—all on their dime. The 25-year-old told authorities she targeted customers who she thought treated her poorly by running her around...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Facebook Releases User Security Guide

August 19, 2011 Added by:Headlines

The guide offers some fairly good advice and illustrative graphics on how to spot common scams and other mischief. It is written in simple enough terms that you, your kids, and your grandparents can all increase your Facebook security outlook a great deal in a matter of only a few minutes...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Identity Theft Has Long Lasting Psychological Effects

August 19, 2011 Added by:Robert Siciliano

The lack of specifics makes it difficult for victims to attain any closure and move forward. “No matter how well they monitor their financial records for the rest of their lives, they may still feel vulnerable,” Van Vliet says...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

AntiSec Hackers Release Sensitive VDI Documents

August 19, 2011 Added by:Headlines

AntiSec hackers have made good on their threat to release sensitive emails and documents stolen in an operation against defense contractor VDI, revealing evidence that financial giant Merrill Lynch may have tipped off VDI about S&P plans to downgrade the U.S. government's credit rating...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Could a Cyber Attack Shut Down the Stock Exchange?

August 19, 2011 Added by:Infosec Island Admin

The system is vulnerable to attacks that would have great consequences to the financial system within the US as well as potentially the world. Perhaps Mr. Kass is just looking to leverage the fear, perhaps he is trying to fire off the "Bat Signal” that something is wrong or inevitable...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Robb Reck - Infosec Expert

August 18, 2011

Robb is a frequent contributor to Infosec Island, and is an experienced Information Security manager in the finance sector. Robb has over 13 years in IT security with proven experience creating and implementing security policy in small and large organizations...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Getting Started with the New Red Hat 5 STIG

August 18, 2011 Added by:Jamie Adams

The generic UNIX STIG supported numerous UNIX and Linux distributions but never addressed Red Hat Enterprise Linux 5. For many years, this lack of support was a source of frustration for system administrators. I've completed my initial review and I want to share some of my findings and tips...

Comments  (2)

49afa3a1bba5280af6c4bf2fb5ea7669

And Now a Word from Your Commonsense

August 18, 2011 Added by:Mike Meikle

As infosec pros debate the finer points of IPv6, cloud security, it behooves us to stop and remember our customers. They don’t care if your solution is FIPS certified and is SAS 70 compliant. They are only concerned if their identity is stolen and used to open a pickle stand in Zanzibar...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Seven Areas of Concern With Cloud Security

August 18, 2011 Added by:Brent Huston

Opportunities abound for those who desire to guide cloud computing. Those concerned with keeping cloud computing an open system drafted an Open Cloud Manifesto, asking that a straightforward conversation needs to occur in order to avoid potential pitfalls...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Five Security Considerations for a Mobile Phone

August 18, 2011 Added by:Robert Siciliano

Mobile users have recently captured the attention of cyber criminals. The Department of Homeland Security and the STOP. THINK. CONNECT. program recommends the following tips to help you protect yourself and to help keep the web a safer place for everyone...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Alexander Polyakov - CTO - ERPScan

August 18, 2011

Alexander Polyakov is the CTO at ERPScan, the OWASP-EAS manager for the OWASP-EAS, and a well-known security expert on enterprise applications such as SAP and Oracle, and who published a significant number of the vulnerabilities found in the applications of these vendors...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

VoIP Vendor Ooma Outage: No DoS Attack Involved

August 18, 2011 Added by:Headlines

Customer services were interrupted by a power failure at the company's data center while their corporate website was simultaneously experiencing excessive traffic levels that was initially reported to have been caused by a denial of service (DoS) attack...

Comments  (1)

850c7a8a30fa40cf01a9db756b49155a

I Know Who You Hacked Last Summer - Attribution 101

August 18, 2011 Added by:J. Oquendo

The media, security companies, and the “Cybersecurity Industrial Complex” labels almost all attacks as Advanced Persistent Threats almost always originating from China. The mechanism for identifying the attackers is always the same: "The attacker came from the following IP address..."

Comments  (7)

69dafe8b58066478aea48f3d0f384820

Top Ten Most Expensive Network Attacks in History

August 18, 2011 Added by:Headlines

Quantifying the cost of a cyber attack is admittedly subjective on some levels given that the scope of the impact may not be readily reportable and collateral damage is difficult to pinpoint, but the author does manage to assemble a viable list of the most devastating network attacks...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

The Life of a Zero Day Worm

August 18, 2011 Added by:Javvad Malik

Given the number of devices currently connected to the internet, factoring in new devices that are being added daily, subtracting devices being removed, factoring in energy reserves and the possibility of a giant tsunami wiping out humanity, I have approximately 134.2 years to go...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Spammers Raise Their Game

August 18, 2011 Added by:Headlines

According to new research conducted by M86 Security Labs, the number of malicious spam emails has increased significantly in August. Last week spams increased by 13%, while this week it has increased another 24%. The majority of these spams are coming from the Cutwail, Festi and Asprox botnets...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Nabil Ouchn - CTO at NETpeas

August 17, 2011

Nabil Ouchn is the co-founder and CTO at NETpeas and the creator of Security Tools Watch. Nabil has over 10 years of experience in IT security assessment, vulnerability management and IS risk analysis driving security pentests and ethical hacking audits...

Comments  (0)