Infosec Island News


The New Facebook Graph Search: How You’re Helping Hackers Gather Information

July 15, 2013 Added by:Tom Eston

Check your privacy settings to make sure your private information doesn’t easily show up in Facebook’s new search engine

Comments  (8)


Trend Spotting @BlackHatEvents: Did I Mention the Irony @BrianKrebs is Bringing?

July 01, 2013 Added by:Joe Franscella

How often do cybersecurity reporters like to tell attack victims' stories? How often are victims willing to go on record about them? Answers: frequently and never.

Comments  (0)


Cyber Attacks the Reality, the Reason and the Resolution Part 3

June 24, 2013 Added by:Larry Karisny

Knowing the reality and reasons behind cyberattacks, it’s time to stop talking and start offering resolution to these serious problems. There is no "it won’t happen to me" anymore. We must immediately deploy prevention and detection technologies to our critical processes or frankly, we could lose it all.

Comments  (0)


Why are Cybercrimes NOT Always White-collar Crimes?

June 17, 2013 Added by:DHANANJAY ROKDE

A generic definition of a crime would be an act that is in violation of the applicable laws.

Comments  (0)


Google: Black Hat or White Hat?

April 23, 2013 Added by:Larry Karisny

Google has a perfect opportunity to be a leader in cybersecurity. Google’s recent network -- and acquisitions and hires -- in Austin, Texas, is an opportunity to do security right the first time.

Comments  (1)


Digital Natives, Digital Immigrants, Exo-Nationals and The Digital Lord of The Flies

March 29, 2013 Added by:Krypt3ia

There seems to be a disconnect within the psyche for kids where their actions are just not real because it happens online. Some of these kids that I tracked online due to recent events with the attacks on Brian Krebs that leads me to believe some of them may in fact be on the road to sociopathy.

Comments  (1)


Sun Tzu and the Art of Cyber-War

March 21, 2013 Added by:Krypt3ia

The overall tactics put forth by the Art of War are applicable because this is warfare we are talking about no matter the landscape (electronic) that we are fighting it in.

Comments  (2)


Personal Reflections on Suits and Spooks DC 2013

February 13, 2013 Added by:Jeffrey Carr

Now that I've had a chance to decompress from and reflect upon the terrific Suits and Spooks DC conference last weekend, I want to share some surprising shifts in thinking that occurred for me during those two days.

Comments  (0)


DARPA on Cyber Targeted-Attack Analyzer program & micro-satellites

February 11, 2013 Added by:Pierluigi Paganini

Protect the country, population and assets from cyber threats, this is a must for every government, a challenge for every state, new processes, large investment and innovative researches are the topics most debated in this period. Yesterday I wrote about the Russian government and its commitment to strengthen cyber defense, today I desire to introduce how US are trying to improve their cyber capa...

Comments  (0)


Common Sense Cybersecurity

January 13, 2013 Added by:Larry Karisny

We start with one big problem. Internet architecture was never made for security. One of my earliest articles quoted the father of the Internet Vint Cerf by saying, "One of things incumbent on all of us is to introduce strong authentication into the fabric of the smart grid. We did not do that with the Internet."

Comments  (0)


Interview with Mark Aiello- CEO of The Revolution Group

January 11, 2013 Added by:InfoSec Institute

What’s interesting in infosec still is that there are all kinds of titles that different companies use, and you have to really get to the nuts and bolts of what they need people to do. There may be five or six generally accepted and used titles that all do the same thing… Security architects – that’s a huge demand right now. But it means different things to different people because, from a...

Comments  (1)


Iran and India, control and monitoring of networks

January 08, 2013 Added by:Pierluigi Paganini

The news is circulating for days, the Iranian head of the national security forces , Esmail Ahmadi Moghadam, declared that low enforcement of the country is developing a software for "smart control" of social-networking sites, the authorities have understood that the control of the powerful platforms is more important filtering.

Comments  (0)


Turkey – Another story on use of fraudulent digital certificates

January 04, 2013 Added by:Pierluigi Paganini

It’s the news of the day, a fraudulent digital certificate that could be used for active phishing attacks against Google’s web properties. Using the certificate it is possible to spoof content in a classic phishing schema or perform a man-in-the-middle attack according Google Chrome Security Team and Microsoft experts.

Comments  (0)


A New Way of Detecting Cybersecurity Attacks

January 04, 2013 Added by:Larry Karisny

Current IDS solutions have high instances of false positives and true negatives and are extremely costly to maintain. Current IDS solutions were not designed for today's hyper connected business processes with high volume of instances. Attempting to detect misuse or anomalous behaviors requires infinite numbers of rules, patterns or algorithms, which is not possible, and is therefore the cause of ...

Comments  (0)


Fraud Files: Pay Later, Pilfer Now

December 18, 2012 Added by:Kelly Colgan

Services such as BillMeLater, a PayPal company that allows customers to make purchases on credit after a simple sign-up process and credit check, have created an identity theft trend and left victims fighting to clear their names...

Comments  (0)


Group-IB: Banking trojan «Carberp» sales were reborn with bootkit module

December 17, 2012 Added by:Pierluigi Paganini

During the last week introduced you the excellent work done by the Group-IB, a security firm resident of the Moscow-based Skolkovo Foundation that has received a grant in the amount of 30m rubles (approximately $966,000) for the development of a global counter-cybercrime system named the CyberCop...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »