October 09, 2012 Added by:Mikko Jakonen
How come banks are telling people to maintain their security better, without putting their OWN reputation and capabilities in line with the DIRECT consequences of the change paradigm towards ‘webalized’ approach we have witnessed for years, has now resulted as poor operational security...
October 09, 2012 Added by:Online Privacy Foundation
The Online Privacy Foundation (OPF) encourages people to get online and consider all the great things social networking sites could do for them. But the evidence is growing that we need to think harder about how we share information online and question how that information is used...
October 03, 2012 Added by:Gianluca Stringhini
We need new techniques to detect and block spam. Current techniques mostly fall in two categories: content analysis and origin analysis. Content analysis techniques look at what is being sent, and typically analyze the content of an email to see if it is indicative of spam...
October 02, 2012 Added by:Philip Polstra
As always happens in a multi-track con, I was unable to attend every talk, so don't take offense if you spoke and your talk isn't listed here. I received many good reports from my students who attended different talks. None of my students complained about any bad talks...
October 02, 2012 Added by:Michelle Drolet
It’s becoming more and more common for workers to store work-related documents on devices they bring to and from work each day. While this can be convenient--employees can access important documents at home or on the road--it also creates greater security risks for businesses...
September 26, 2012 Added by:Will Tarkington
The method I used for this particular tactic was to monitor the conversational rhythm. Then inject into it and take it over allowing me to guide the conversation. The skill set that allows you to walk into a conversation and take it over can’t be understated...
September 18, 2012 Added by:Jason Clark
Today’s phishing attacks are slow-and-low for evasion, highly targeted and look legitimate. Malware is increasingly delivered via an embedded URL which might not be live until days after the email is sent. Many of the CSOs also received variants of spear-phishing via SMS during the meeting...
September 06, 2012 Added by:Pierluigi Paganini
With 556 million of victims per year, 2 of 3 adults have been victims of online crime in their lifetime, with a total economic loss of 110 Billion and an average cost per victim of $197. The trend demonstrates the need to put in place a massive awareness campaign...
August 21, 2012 Added by:Headlines
Four men were arrested for their roles in an identity theft scheme involving the theft of credit card numbers used to fraudulently purchase fuel at gas stations in order to be sold, distributed, or otherwise used by the defendants in order to obtain criminal proceeds...
August 17, 2012
Jeff Bardin, a Principal at Treadstone 71 LLC, shared a variety of open source tools that businesses and consumers can use can for “espionage, competitive intelligence, and intellectual property” purposes. Check out this video to find out more about these tools and what they can do...
August 07, 2012 Added by:Headlines
In addition to creating and disseminating fake coupons, Henderson also wrote tutorials and created templates he posted online and that provided instructions for creating counterfeit coupons using their own computers. Henderson’s scheme caused retailers and manufacturers to lose approximately $900,000....
August 03, 2012 Added by:Pierluigi Paganini
There are bots creating a significant number of fake profiles, which are managed by machines capable of interacting with each other and with real users, thus changing the "sentiment" and "conversation" on a large-scale, as well as altering the social graph to preclude meaningful correlations of data...
August 01, 2012 Added by:Infosec Island Admin
What I came out with, after many slides of numbers, was “nope not really”, which I pretty much had thought before. There are just too many variables to this type of venture and you would need to have a trained psychoanalyst to talk to the individual to determine whether or not they are a true psychopath...
July 31, 2012 Added by:ʞɔopuooq ʇuıɐs
I have done my best to ignore rantings, trying not to feed the trolls, but Emick recently upped her campaign against me and created a blog post berating my methods. One of my valued supporters, @render64, has read Emick's blog and kindly used intelligent analysis in order to expose what’s really going on here...
July 25, 2012 Added by:Infosec Island Admin
It seems to me that more and more we are being collectively mined not only for our habits, but now our emotions as well as our psychological makeups. All of this could potentially be collated from numerous sources. I doubt we will ever be able to contextualize the human psyche just from internet datum…
July 13, 2012 Added by:Headlines
"The FBI announced three more arrests arising from Operation Card Shop, an international operation aimed at sophisticated, highly organized cyber criminals involved in buying and selling stolen identities, exploited credit cards, counterfeit documents, and sophisticated hacking tools..."
Nortel: From Bankruptcy to Industrial Espion... Eddie colin on 07-23-2014
Don’t Let Your Guard Down: Tragedies Pave ... lafseo wify on 07-22-2014
Don’t Let Your Guard Down: Tragedies Pave ... shahbaz ocpfsd1 on 07-19-2014