Latest Posts

10e258c8d23d441b915c1b2333b6996a

HIPAA-HITECH Compliance: Two Free Webinars

June 16, 2011 Added by:Jack Anderson

We have scheduled two new free webinars on HIPAA HITECH for Smarties. These webinars feature a presentation by Rebecca Herold,CIPP, CISSP, CISA, CISM, FLMI, recently voted the 3rd best privacy advisor in the world, in competition with large law firms and consulting practices...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

LulzSec Attacks CIA Website, Taunts The Jester

June 16, 2011 Added by:Headlines

The hacker collective known as LulzSec conducted a successful attack against a public-facing website of the CIA on Wednesday. The DDoS attack, which caused periodic outages, was announced with a Twitter message from the group stating, "Tango down - cia.gov - for the lulz..."

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Anti-Hacker Kill Switch Voodoo Containment Systems

June 15, 2011 Added by:J. Oquendo

Internet killswitches: Who needs them and why. It is rather ironic to even think about the United States attempting to carry out some form of killswitch considering that at the same time, the government is trying to build a system to bypass other countries' killswitches...

Comments  (3)

Fc152e73692bc3c934d248f639d9e963

VoIP and PCI Compliance

June 15, 2011 Added by:PCI Guru

When you start talking to security people about VoIP security, their knee-jerk response is to tell you that VoIP is secured by the corporate firewall. However, given that the VoIP protocols are stateless, even being behind a firewall really does not provide any protection...

Comments  (1)

F520f65cba281c31e29c857faa651872

CIO: Throw Your Ego Out of the Window

June 15, 2011 Added by:Rahul Neel Mani

CIOs often don’t want to come out of their IT shell. Rather than thinking business, they get immersed into IT. Although a lot of CIOs do have those skills, but they don’t move away from IT. You need a lot of guts to get to the CEO’s position, it’s a totally different ballgame...

Comments  (0)

85612d572d689128ab07f369ff934d02

FIPS 140-2: Just Buzzword Bingo?

June 15, 2011 Added by:Jonathan Lampe

If your IT department intersects with the finance, health care, government or energy sectors, or is subject to regulations such as PCI-DSS, then you should be using FIPS 140-2 validated cryptography now to protect data-in-transit and data-at-rest...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Project Cyber Dawn Explored Libyan Vulnerabilities

June 15, 2011 Added by:Headlines

The authors of Cyber Dawn argued that something similar to the Stuxnet attack on Iran could be done in Libya, noting that German engineering conglomerate Siemens AG — whose software system was exploited by Stuxnet — has played an important role in projects across the Libya...

Comments  (9)

959779642e6e758563e80b5d83150a9f

HIPAA Compliance and Cloud Security

June 15, 2011 Added by:Danny Lieberman

A discussion of HIPAA compliance needs to include a comprehensive threat analysis of the entire supply chain of data processing and not just limit itself to the cloud services that store electronic medical records...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Y-12 Nuclear Weapons Plant Targeted in Cyberattack

June 15, 2011 Added by:Headlines

"Y-12's external website has been replaced with a temporary information page. At this point, there is no evidence that any plant-wide email or internal computing services have been affected, nor has any classified or sensitive information been accessed or affected by this incident..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Twelve Tips for Combating Identity Theft

June 15, 2011 Added by:Headlines

The bad news is that the cost of remediating an identity theft event increased by sixty-three percent over the same time period, and the incidence of "friendly fraud" - identity theft by an acquaintance of the victim - rose seven percent...

Comments  (1)

7377f47f95a1202ea8d330061b674dea

Gartner Security and Risk Management Summit 2011

June 14, 2011 Added by:Lawrence Pingree

Increases in the complexity and volume of targeted attacks coupled with the necessity for companies to address compliance issues continues to support healthy security market growth. We will be examining the key security issues at the upcoming Gartner Security and Risk Management Summit...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Worse Than Zombies: The Mobile Botnets Are Coming

June 14, 2011 Added by:Kelly Colgan

As our smartphones have become our wallets and personal computers, holding everything from banking to social network information, they’ve become targets for hackers, scammers and criminals. Our phones hold a treasure trove of data—and the bad guys know it...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

This Article Has Been Has Been Re-Hashed Re-Hashed

June 14, 2011 Added by:J. Oquendo

Targeted phishing, aka spearfishing attacks, have been noticed since 9/11 and no one seems to have gotten their act together to defend against this attack. The attack itself is almost always defendable with, and I have stated this over and over again, Extrusion Prevention...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Anonymous Takes Aim at Bernanke and Federal Reserve

June 14, 2011 Added by:Headlines

"We cannot remain passive while our future is going up in flames. It is time for us to stand up for ourselves. It is time for you to stand up for yourself. We must restore the rule of law and fight back against the organized criminal class. We must now launch 'Operation Empire State Rebellion..."

Comments  (1)

37d5f81e2277051bc17116221040d51c

OddJob Trojan Hijacks Online Banking Sessions

June 14, 2011 Added by:Robert Siciliano

The OddJob Trojan hijacks online banking sessions, keeping users’ accounts open after they think they’ve quit. Hackers can then access the open account to make fraudulent transactions. When your computer’s security is lax, you’re vulnerable to malware or malicious software...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Hey CISO, Your Budget is Killing You...

June 14, 2011 Added by:Rafal Los

You've wrestled with justifying initiatives, programs, and security-driven innovation you want to implement to keep the company safe and lower the risk profile, but what you may not know is that the budget you've been working so hard to grow may actually be secretly killing you...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

CIA Chief: Cyberattack Could Be Next Pearl Harbor

June 14, 2011 Added by:Headlines

“The next Pearl Harbor we confront could very well be a cyber attack that cripples our power systems, our grid, our security systems, our financial systems, our governmental systems. It is going to take both defensive measures as well as aggressive measures to deal with it..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

From Lulz to Global Espionage: The Age of the Cracker

June 14, 2011 Added by:Infosec Island Admin

For groups like Lulzsec, they are passing from the nuisance category into perceived enemies of the state. Once they start attacking government and military targets, they are likely to see a more hardened response from intelligence agencies as well as the likes of the FBI...

Comments  (1)

7c5c876d1933023ac375eead04302e1a

You Can't Buy DLP

June 13, 2011 Added by:Boris Sverdlik

To implement a data loss solution, you must take a holistic approach to identify the problem, threat vectors and vulnerabilities. You must understand where your sensitive data lives within your organization. This can’t be done with a tool, regardless of how good they claim it is...

Comments  (3)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Privacy by Design: Key Concern for VCs and Start-Ups

June 13, 2011 Added by:David Navetta

Privacy by design makes privacy an essential component of the core product or service a company delivers. Spotting privacy issues and addressing concerns before launch aligns products and services with consumer expectations and can save everyone from future headaches...

Comments  (0)