Infosec Island News
October 18, 2012 Added by:Pierluigi Paganini
Hacktivism is considered one of the main cyber threats and its operations have created serious problems to private businesses and governments, for this reason security expert all over the world are trying to deeply analyze the different movements of dissent and their mutual relationships...
October 15, 2012 Added by:Pierluigi Paganini
Panetta has warned of cyber attacks against critical infrastructure and that opponents are increasing their cyber capabilities and represent a serious menace. The words used last Thursday are very strong: The US is in a “pre-9/11 moment,” referring to a possible series of cyber attacks...
October 08, 2012 Added by:Pierluigi Paganini
In the last decade the number of cyber incidents related to technologies that surround us is growth exponentially, the principal concerns are related to all those objects with an "intelligent component" that we daily use expose on internet for different purposes...
October 05, 2012 Added by:Pierluigi Paganini
Iran was recently blamed for attacks onoil companies and banks. This time the scenario appears reversed, as attacks targeted Iranian infrastructure and communications, causing serious damages to Internet connections...
October 02, 2012 Added by:Pierluigi Paganini
The news is circulating on the internet creating great concern once again that Chinese hackers have hit the infrastructure of a foreign state, and once again we are speaking of cyber espionage, but this time they were able to access the White House Military Office...
October 01, 2012 Added by:Pierluigi Paganini
It's known that military sector represents a privileged incubator for new technologies than in many cases are subsequently used in civil. We have already read about the existence of software to spy on victims that are able to record communications and movements but the Naval Surface Warfare Center in Crane, Indiana in collaboration with researchers at Indiana University created a new type of 'vi...
September 18, 2012 Added by:Pierluigi Paganini
Despite the use of cyber weapons and the damage caused by offensive operations being major concerns for intelligence agencies, clues are frequently discovered about attacks designed to steal sensitive information and intellectual property. Who is behind these cyber attacks?
August 16, 2012 Added by:Brian Dean
The bottom line: Hacking is lucrative and can be executed from nearly anywhere in the world. Security professionals should be providing risk assessment results annually to executive management. Of course, providing a list of vulnerabilities is probably career limiting. This is the balancing act we must perform...
August 10, 2012 Added by:Pierluigi Paganini
I've found some interesting research conducted by Carnegie Mellon computer security professor Nicolas Christin on the earnings of one of the most famous black markets in the Deep Web, the Silk Road. It seems to be able to realize $22 Million in annual revenues related to the drug market...
July 30, 2012 Added by:Pierluigi Paganini
In Middle East, the number of malware that have been developed for state sponsored projects surely represents an anomaly. All the examples provided are evidence of the intent of governments to hit their enemies in the cyberspace to steal sensitive information or to destroy their critical infrastructure...
July 10, 2012 Added by:Infosec Island Admin
Black Hat remains the biggest and the most important technical security conference series in the world by delivering timely, actionable security information in a vendor-neutral environment. Infosec Island would like to extend a special thanks to Tripwire for making possible our presence at the event...
July 01, 2012 Added by:Stacey Holleran
Small technology companies are finding themselves in a unique business situation as prospective clients increasingly request software applications and hosting solutions that can accommodate secure mobile payment transactions, bringing these technology companies to the forefront as “merchant service providers”...
May 14, 2012 Added by:Headlines
The content on a website maintained by anit-jihadi hacker The Jester (th3j35t3r) has been deleted and the hacktivist's Twitter account has been mysteriously taken down, and the events have sent the Twittersphere into a frenzy of conjecture... Has The Jester been doxed?
May 01, 2012 Added by:Jeffrey Carr
When the largest security companies in the world have had their source code stolen by hackers, our present security model is broken. Matt Brazil, a former U.S. embassy commercial officer in Beijing, will show executives how to survive in China without losing their secrets...
April 29, 2012 Added by:Michelle Valdez
Congress is procrastinating with regards to cybersecurity legislation. The debates will continue about regulation and authorities and privacy rights but in the end, we all need to come together and find the best way to share threat data so that we can protect critical networks...
April 13, 2012 Added by:Ron Baklarz
Was it me or when they showed the North Korean Space Control Center did it not look like a group of students at a code fest? Seriously, there were no large screens for tracking and I’ve seen more computing power at the local senior citizens home...
Hacker to Release Symantec's PCAnywhere Sour... Kajal Singh on 04-21-2015
Financial Malware Fell in 2014 As Takedown O... Kajal Singh on 04-21-2015
Weaknesses in Air Traffic Control Systems ar... Kajal Singh on 04-21-2015