Vulns & Alerts

E595c1d49bf4a26f8e14ce59812af80e

Stopping Remote Access Breaches with “Honey”

February 07, 2014 Added by:Patrick Oliver Graf

A new approach, called “Honey Encryption”, could potentially offer more effective digital security by making fake data appear to be legitimate and valuable information to hackers.

Comments  (5)

03b2ceb73723f8b53cd533e4fba898ee

GCHQ ran a DoS attack on chatrooms used by Anonymous and LulzSec

February 06, 2014 Added by:Pierluigi Paganini

New slides leaked by Snowden and published by NBC News reveal that GCHQ ran DoS attack on chatrooms used by Anonymous and LulzSec.

Comments  (4)

201d6e4b7cd0350a1a9ef6e856e28341

How serious is the Aurora vulnerability for nuclear plants?

February 04, 2014 Added by:Joe Weiss

This risk is certainly more probable than once in a million years which is the minimum criteria for the safety analysis to address specific threats.

Comments  (0)

1b061b1cec6b5898e5326992d9461610

Search Engines for OSINT and Recon

February 03, 2014 Added by:Dave Shackleford

There’s an amazing number of awesome search facilities that can be useful when doing OSINT and recon work for pen testing. I’ll list a lot of different sites that I have discovered and use regularly for both.

Comments  (0)

52a995fead03e1d828980d4b3efd2719

What the Snowden Leaks Can Teach Us About Data Security

November 14, 2013 Added by:Cam Roberson

One of the major issues discussed in the wake of the National Security Agency leak involving Edward Snowden was how the government can prevent a similar leak from happening in the future. This article looks at several specific measures that can strengthen data security, making it more difficult for bad actors to break into the system, and tougher for them to make off with sensitive information onc...

Comments  (0)

54b393d8c5ad38d03c46d060fa365773

Security Advisor Alliance, A Nonprofit of Elite CISOs giving back to the community.

November 12, 2013 Added by:Jason Clark

Security Advisor Alliance is a nonprofit group of Top security leaders from the Global 1000 who have come together to donate time each week to help our peers in any area of security as a pro-bono service.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Belgacom Hack, State-sponsored Attack Hypothesis

September 18, 2013 Added by:Pierluigi Paganini

Belgacom hack, the telecommunications company found evidence of digital intrusion in the company systems, many experts believe in a state-sponsored attack.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Insider Steals Data of 2 Million Vodafone Germany Customers

September 12, 2013 Added by:Mike Lennon

Vodafone Germany said an attacker with insider knowledge had stolen the personal data of two million of its customers from a server located in Germany.

Comments  (0)

4c8a80b80e239c2dd6cd6f8760e10e5f

Gaining a Data Security Edge with Social Threat Detection

August 16, 2013 Added by:Vince Schiavone

From weak data protection practices to sophisticated organized attacks, enterprises are facing a multi-front war when it comes to protecting and preserving their information and intellectual property.

Comments  (0)

F66c1a87a8db2cb584b4e06e93a84ce3

“SIGINT” on 802.11b/g/n Distributed SDR Station - Deployment Example

August 15, 2013 Added by:Mikko Jakonen

“SIGINT” on 802.11b/g/n distributed SDR station - deployment example is overview of using SDR (Software Defined Radio) receiver system deployment to capture 802.11b/g/n “traffic”, signals on frequency range 2412- 2484 MHz.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security and Terrorism – See Something, Say Something

August 08, 2013 Added by:Jon Stout

he existing cyber security computing model of the past decade, based on firewalls, anti-viral services, intrusion detection controls, etc., is no longer adequate to help organizations mitigate cyber-security risk.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Top Secret SCI Jobs - The Value of Smaller Contractors

July 30, 2013 Added by:Jon Stout

You can be doing all the right things, adding immense value to your customer and helping your company build a great brand. When a contract changes even incumbents are suddenly “on the bench” or “between projects” or “on overhead” . You are no longer billable. As a result you have now moved from a profit-generator to a cost center. When this happens you are at risk.

Comments  (0)

4c8a80b80e239c2dd6cd6f8760e10e5f

Protecting the Enterprise Against Growing Social Threats

July 29, 2013 Added by:Vince Schiavone

Corporations looking to proactively protect the business against growing enterprise social risks are engaging advanced, strategic solutions to unveil and track a wide array of social threats. This delivers strategic intelligence for proactive response to effectively mitigate these threats, often before they explode into all out crises.

Comments  (4)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Tricky Game of Breach Notification

July 16, 2013 Added by:Rafal Los

I received an email today from a vendor I use regularly, notifying me that there had been “unauthorized access attempts” to their web platform against a small pool of accounts.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Subtleties of Enterprise Security Vulnerability Management — at Scale

July 11, 2013 Added by:Rafal Los

Enterprises face some interesting challenges as they grow. Once you scale to any real size, tasks that seemed simple become unmanageable and difficult, even confused. One of those tasks is vulnerability management, and while it may sound simple and trivial, I assure you it is, indeed, not.

Comments  (1)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: Addressing the Open Doors in Your APT Strategy

July 10, 2013 Added by:InfosecIsland News

With APTs leveraging these weaknesses, it’s critical to have visibility and control of enterprise key and certificate inventories. Cyber criminals understand that the easy targets are those organizations that have little visibility into their threat surface and cannot respond quickly. We need to gain control over trust; we need to plug the gap related to key & certificate-based exploits. (Re...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »