Infosec Island News

8a958994958cdf24f0dc051edfe29462

Common Sense Cybersecurity

January 13, 2013 Added by:Larry Karisny

We start with one big problem. Internet architecture was never made for security. One of my earliest articles quoted the father of the Internet Vint Cerf by saying, "One of things incumbent on all of us is to introduce strong authentication into the fabric of the smart grid. We did not do that with the Internet."

Comments  (0)

86d8831c7ce6fcda920aac867a984d98

Interview with Mark Aiello- CEO of The Revolution Group

January 11, 2013 Added by:InfoSec Institute

What’s interesting in infosec still is that there are all kinds of titles that different companies use, and you have to really get to the nuts and bolts of what they need people to do. There may be five or six generally accepted and used titles that all do the same thing… Security architects – that’s a huge demand right now. But it means different things to different people because, from a...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Iran and India, control and monitoring of networks

January 08, 2013 Added by:Pierluigi Paganini

The news is circulating for days, the Iranian head of the national security forces , Esmail Ahmadi Moghadam, declared that low enforcement of the country is developing a software for "smart control" of social-networking sites, the authorities have understood that the control of the powerful platforms is more important filtering.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Turkey – Another story on use of fraudulent digital certificates

January 04, 2013 Added by:Pierluigi Paganini

It’s the news of the day, a fraudulent digital certificate that could be used for active phishing attacks against Google’s web properties. Using the certificate it is possible to spoof content in a classic phishing schema or perform a man-in-the-middle attack according Google Chrome Security Team and Microsoft experts.

Comments  (0)

8a958994958cdf24f0dc051edfe29462

A New Way of Detecting Cybersecurity Attacks

January 04, 2013 Added by:Larry Karisny

Current IDS solutions have high instances of false positives and true negatives and are extremely costly to maintain. Current IDS solutions were not designed for today's hyper connected business processes with high volume of instances. Attempting to detect misuse or anomalous behaviors requires infinite numbers of rules, patterns or algorithms, which is not possible, and is therefore the cause of ...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Fraud Files: Pay Later, Pilfer Now

December 18, 2012 Added by:Kelly Colgan

Services such as BillMeLater, a PayPal company that allows customers to make purchases on credit after a simple sign-up process and credit check, have created an identity theft trend and left victims fighting to clear their names...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Group-IB: Banking trojan «Carberp» sales were reborn with bootkit module

December 17, 2012 Added by:Pierluigi Paganini

During the last week introduced you the excellent work done by the Group-IB, a security firm resident of the Moscow-based Skolkovo Foundation that has received a grant in the amount of 30m rubles (approximately $966,000) for the development of a global counter-cybercrime system named the CyberCop...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Fraud Files: When Tax Fraud Won’t Go Away

December 11, 2012 Added by:Kelly Colgan

Though it could create procedural challenges for the IRS and the U.S. Postal Service, Congress could solve the problem by simply refusing to issue refunds before April 15. That way they could see who has duplicate returns filed, and investigate before signing over checks to the bad guys...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Joining hands against cybercrime in Africa

November 08, 2012 Added by:Pierluigi Paganini

Concerned over rising threats online, Cyber security agents in Africa are taking a proactive step by collaborating with global network-security experts to curb cybercriminal activities on the continent, where they will share information and technical know-how...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

TrendMicro Q3 Security Report

October 24, 2012 Added by:Pierluigi Paganini

Trend Micro has released the 3Q 2012 SECURITY ROUNDUP that presents a worrying trend for malware growth which increased 483%. This includes cyber espionage malware and also destructive malicious agents targeting mainly the mobile world and in particular Google Android platform...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Prolexic Q3 2012 ... a new generation of DDoS attacks

October 20, 2012 Added by:Pierluigi Paganini

This is significant because very few companies or organizations have the necessary network infrastructure to deal with such attacks. There might be some companies with popular websites such as Google or Facebook that are able to handle such high-bandwidth floods, but most companies are not...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Anonymous vs Wikileaks...you can condemn a man but not wipe out an ideology

October 18, 2012 Added by:Pierluigi Paganini

Hacktivism is considered one of the main cyber threats and its operations have created serious problems to private businesses and governments, for this reason security expert all over the world are trying to deeply analyze the different movements of dissent and their mutual relationships...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Secretary of Defense Panetta on U.S. Cyber Capabilities

October 15, 2012 Added by:Pierluigi Paganini

Panetta has warned of cyber attacks against critical infrastructure and that opponents are increasing their cyber capabilities and represent a serious menace. The words used last Thursday are very strong: The US is in a “pre-9/11 moment,” referring to a possible series of cyber attacks...

Comments  (4)

03b2ceb73723f8b53cd533e4fba898ee

GAO Invites FDA to Improve Information Security for Medical Devices

October 08, 2012 Added by:Pierluigi Paganini

In the last decade the number of cyber incidents related to technologies that surround us is growth exponentially, the principal concerns are related to all those objects with an "intelligent component" that we daily use expose on internet for different purposes...

Comments  (5)

03b2ceb73723f8b53cd533e4fba898ee

Attacks Cause Serious Damage to Internet Connection in Iran

October 05, 2012 Added by:Pierluigi Paganini

Iran was recently blamed for attacks onoil companies and banks. This time the scenario appears reversed, as attacks targeted Iranian infrastructure and communications, causing serious damages to Internet connections...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Chinese cyber attack against the White House

October 02, 2012 Added by:Pierluigi Paganini

The news is circulating on the internet creating great concern once again that Chinese hackers have hit the infrastructure of a foreign state, and once again we are speaking of cyber espionage, but this time they were able to access the White House Military Office...

Comments  (2)

Page « < 1 - 2 - 3 - 4 - 5 > »