Latest Posts

69dafe8b58066478aea48f3d0f384820

Anonymous Spokesman 'Topiary' Arrested in Scotland

July 27, 2011 Added by:Headlines

Scotland Yard says officers from its specialist cybercrime unit have arrested the suspected spokesman of the LulzSec hacking group. In a statement Wednesday the police force says that the 19-year-old was arrested at an address in Scotland. They say he is the hacker known as 'Topiary'...

Comments  (1)

3e35900ae6facc6c146a85c435c71d82

Cloud Computer Security Techniques and Tactics

July 27, 2011 Added by:Ben Rothke

Companies are spending billions of dollars migrating applications and data centers to the cloud. One is hard pressed to find many Fortune 500s who have not yet used cloud computing. But in the rush to move to the cloud, many companies have neglected to ensure cloud security is built in...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Report: DOD in the Midst of a Global Cyberspace Crisis

July 27, 2011 Added by:Headlines

According to the U.S. Strategic Command, the DOD is in the midst of a global cyberspace crisis as foreign nation states and other actors, such as hackers, criminals, terrorists, and activists exploit DOD and other U.S. government computer networks to further a variety of ideological objectives...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Too Many Tools, Not Enough Glue?

July 26, 2011 Added by:Rafal Los

The difficult part with handling information security seems to be memory, applicability, and planning. Can I recall where that tool is and how it works? Do I have enough actionable intelligence right now? Did I leave enough breadcrumbs to prepare me for this need? Is there a plan?

Comments  (0)

Bc353c4c6a6f7743290ce11723414424

PowerShell 2.0 Protects You From Viruses

July 26, 2011 Added by:Dawn Hopper

You can imagine that when building PowerShell, Microsoft surely wanted to avoid the disaster produced by the freely-executable nature of VBScript and JavaScript on Windows systems. PowerShell was launched with some significant protections against this kind of mischief...

Comments  (1)

F29746c6cb299c1755e4087e6126a816

FTC Panel: How to Protect Your Kids

July 26, 2011 Added by:Kelly Colgan

At the national level, representatives from government, business, nonprofits, legal services and victim advocacy organizations explored the nature, prevention and resolution of identity fraud that target children, particularly foster youths...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

National Security Council on Transnational Organized Crime

July 26, 2011 Added by:Headlines

Transnational Organized Crime networks are increasingly involved in cybercrime, which costs consumers billions of dollars annually, threatens sensitive corporate and government computer networks, and under­mines worldwide confidence in the international financial system...

Comments  (0)

37d5f81e2277051bc17116221040d51c

McAfee Reports Most Malware Ever in Early 2011

July 26, 2011 Added by:Robert Siciliano

In February alone, approximately 2.75 million new malware samples were recorded. Fake antivirus software had an active quarter as well, reaching its highest levels in more than a year, with 350,000 unique samples recorded in March. Mobile malware is the new frontier of cybercrime...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Top Ten Dangerous Internet User Behaviors

July 26, 2011 Added by:Headlines

Call it laziness, or perhaps an unjustified feeling of immunity - the "that will never happen to me" syndrome. Ether way, all the efforts of security experts and vendors are regularly being undone by the risky actions of end-users, and the cyber crooks are capitalizing on this fact...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

UK Cabinet Office Report: The Cost of Cyber Crime

July 26, 2011 Added by:Headlines

The report indicates that, at a total estimated cost of £21bn, over three-quarters of the economic impact of cyber crime in the UK is felt by business. In all probability, and in line with worst-case scenarios, the real impact of cyber crime is likely to be much greater...

Comments  (0)

B8b580348b4e717042d0e394ee072001

My Canons on (ISC)² Ethics - Such as They Are

July 25, 2011 Added by:security curmudgeon

In the email thread between ISC2 general counsel Dorsey Morrow and CISSP holder Boris Sverdlik, one of the replies from Morrow was unbelievable. Not only is the email negligent and libelous, it demonstrates unprofessional behavior and a serious lack of knowledge...

Comments  (17)

A08e32d2f9a8b78894d964ec7fd4172e

JNCIE Tips From the Field Summarization Made Easy

July 25, 2011 Added by:Stefan Fouant

Sumarization is a key aspect of practical exams involving routing of some sort. Those who have ever taken a CCIE Routing & Switching or CCIE Service Provider exam can attest, summarization is one thing every expert level candidate needs to master. It is no different with Juniper...

Comments  (0)

Bdd5942b986a243fd2d84461611aec6a

So I Took Your Data, But I Am Safe Here...

July 25, 2011 Added by:Anup Shetty

There are too many inherited intricacies associated with extradition, but again the question remains - is this something that the corporate world needs so that they can see a ray of hope the next time they identify criminal activity from the darkest corners of the cyber crime world?

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Sneaky LinkedIn is Using Member Profiles for Advertising

July 25, 2011 Added by:Headlines

"When LinkedIn members recommend people and services, follow companies, or take other actions, their name/photo may show up in related ads shown to you. Conversely, when you take these actions on LinkedIn, your name/photo may show up in related ads shown to LinkedIn members..."

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

On Branding Your Enterprise Compliance Project

July 25, 2011 Added by:Thomas Fox

Even with the economy on the upswing, corporations being extremely conservative on funding, especially for departments which are viewed as more overhead than revenue generating. Project teams who embrace a brand mentality put themselves in a stronger position to achieve their goals...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Oslo Bombing Facebook Scam Infects One Per Second

July 25, 2011 Added by:Headlines

"Be cautious when clicking on breaking news trends and stories within search results related to the Oslo tragedy. Right now it seems to be infecting one user every second. The scam is a form of ‘clickjacking’ that replicates itself on users’ walls after they click on fake posts..."

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

PCI Compliance Scam? You Tell Me...

July 25, 2011 Added by:PCI Guru

These sorts of actions by organizations just add fuel to the fire for critics to use as another argument as to why the PCI compliance programs are pointless and organizations should not bother with complying with any of the PCI standards...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Indicted iPad Hacker Predicts Internet Revolution

July 25, 2011 Added by:Headlines

“I look at it like the precursor to revolution. I really think this is throwing tea in the bay. I’m tired of seeing a financial industry suck at the trough of 401K’s, looting my nation and leaving us a third-world country..."

Comments  (0)

Bc353c4c6a6f7743290ce11723414424

ASA and IPS Parallel Features – Part III

July 25, 2011 Added by:Dawn Hopper

One scenario in which asymmetric routing of packets is frequently seen is with topologies designed for load balancing. The unintended consequence of this behavior would be connectivity problems due to dropped packets not matching the device state table...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Web Application Attacks Can Peak at 25,000 an Hour

July 25, 2011 Added by:Headlines

The study of 10 million web application attacks shows automated attacks peak at 25,000 an hour. "The level of automation in cyber attacks continues to shock us. The sheer volume of attacks that can be carried out in such a short period of time is almost unimaginable to most businesses..."

Comments  (0)