February 20, 2014 Added by:Rob Fuller
Over the years of doing DNS record collection I have noticed one thing, most domains have a large number of short hostnames that are easy to remember, usually 4 characters or less. I’m sure you already know where I’m going with this, I wanted to brute force all possible hostnames up to 4 characters.
February 18, 2014 Added by:Pierluigi Paganini
Surfing in various cyber criminal forums or visiting some hidden services in the DeepWeb, it is quite easy to discover forums dedicated to facilitating the matching of supply and demand.
February 06, 2014 Added by:Pierluigi Paganini
New slides leaked by Snowden and published by NBC News reveal that GCHQ ran DoS attack on chatrooms used by Anonymous and LulzSec.
February 04, 2014 Added by:Joe Weiss
This risk is certainly more probable than once in a million years which is the minimum criteria for the safety analysis to address specific threats.
February 03, 2014 Added by:Dave Shackleford
There’s an amazing number of awesome search facilities that can be useful when doing OSINT and recon work for pen testing. I’ll list a lot of different sites that I have discovered and use regularly for both.
November 14, 2013 Added by:Cam Roberson
One of the major issues discussed in the wake of the National Security Agency leak involving Edward Snowden was how the government can prevent a similar leak from happening in the future. This article looks at several specific measures that can strengthen data security, making it more difficult for bad actors to break into the system, and tougher for them to make off with sensitive information onc...
November 12, 2013 Added by:Jason Clark
Security Advisor Alliance is a nonprofit group of Top security leaders from the Global 1000 who have come together to donate time each week to help our peers in any area of security as a pro-bono service.
September 12, 2013 Added by:Mike Lennon
Vodafone Germany said an attacker with insider knowledge had stolen the personal data of two million of its customers from a server located in Germany.
August 16, 2013 Added by:Vince Schiavone
From weak data protection practices to sophisticated organized attacks, enterprises are facing a multi-front war when it comes to protecting and preserving their information and intellectual property.
August 15, 2013 Added by:Mikko Jakonen
“SIGINT” on 802.11b/g/n distributed SDR station - deployment example is overview of using SDR (Software Defined Radio) receiver system deployment to capture 802.11b/g/n “traffic”, signals on frequency range 2412- 2484 MHz.
August 08, 2013 Added by:Jon Stout
he existing cyber security computing model of the past decade, based on firewalls, anti-viral services, intrusion detection controls, etc., is no longer adequate to help organizations mitigate cyber-security risk.
July 30, 2013 Added by:Jon Stout
You can be doing all the right things, adding immense value to your customer and helping your company build a great brand. When a contract changes even incumbents are suddenly “on the bench” or “between projects” or “on overhead” . You are no longer billable. As a result you have now moved from a profit-generator to a cost center. When this happens you are at risk.
July 29, 2013 Added by:Vince Schiavone
Corporations looking to proactively protect the business against growing enterprise social risks are engaging advanced, strategic solutions to unveil and track a wide array of social threats. This delivers strategic intelligence for proactive response to effectively mitigate these threats, often before they explode into all out crises.
Verizon Injecting Perma-Cookies to Track Mo... kim cung on 12-21-2014
Android Phones in China Hit by Most Costly M... kim cung on 12-21-2014
Ask The Experts: Why Do Security Testing of ... kim cung on 12-20-2014