Infosec Island News
August 16, 2012 Added by:Brian Dean
The bottom line: Hacking is lucrative and can be executed from nearly anywhere in the world. Security professionals should be providing risk assessment results annually to executive management. Of course, providing a list of vulnerabilities is probably career limiting. This is the balancing act we must perform...
August 10, 2012 Added by:Pierluigi Paganini
I've found some interesting research conducted by Carnegie Mellon computer security professor Nicolas Christin on the earnings of one of the most famous black markets in the Deep Web, the Silk Road. It seems to be able to realize $22 Million in annual revenues related to the drug market...
July 30, 2012 Added by:Pierluigi Paganini
In Middle East, the number of malware that have been developed for state sponsored projects surely represents an anomaly. All the examples provided are evidence of the intent of governments to hit their enemies in the cyberspace to steal sensitive information or to destroy their critical infrastructure...
July 10, 2012 Added by:Infosec Island Admin
Black Hat remains the biggest and the most important technical security conference series in the world by delivering timely, actionable security information in a vendor-neutral environment. Infosec Island would like to extend a special thanks to Tripwire for making possible our presence at the event...
July 01, 2012 Added by:Stacey Holleran
Small technology companies are finding themselves in a unique business situation as prospective clients increasingly request software applications and hosting solutions that can accommodate secure mobile payment transactions, bringing these technology companies to the forefront as “merchant service providers”...
May 14, 2012 Added by:Headlines
The content on a website maintained by anit-jihadi hacker The Jester (th3j35t3r) has been deleted and the hacktivist's Twitter account has been mysteriously taken down, and the events have sent the Twittersphere into a frenzy of conjecture... Has The Jester been doxed?
May 01, 2012 Added by:Jeffrey Carr
When the largest security companies in the world have had their source code stolen by hackers, our present security model is broken. Matt Brazil, a former U.S. embassy commercial officer in Beijing, will show executives how to survive in China without losing their secrets...
April 29, 2012 Added by:Michelle Valdez
Congress is procrastinating with regards to cybersecurity legislation. The debates will continue about regulation and authorities and privacy rights but in the end, we all need to come together and find the best way to share threat data so that we can protect critical networks...
April 13, 2012 Added by:Ron Baklarz
Was it me or when they showed the North Korean Space Control Center did it not look like a group of students at a code fest? Seriously, there were no large screens for tracking and I’ve seen more computing power at the local senior citizens home...
March 31, 2012 Added by:Infosec Island Admin
In a shocking turn of events, the hacktivist known as th3j35t3r has been identified as Robert "Lance" Miller from Pittsboro, North Carolina. Mr Miller is now in police custody after the multi-agency operation took place in the early hours of the morning on April 1st, 2012...
March 23, 2012 Added by:Pierluigi Paganini
During a conference at the IEEE's International Workshop on Security and Social Networking SESOC 2012 in Lugano, Switzerland, researchers presented on a new critical vulnerability on Facebook, a zero day privacy loophole that they have named the "Deactivated Friend Attack"...
March 16, 2012 Added by:Pierluigi Paganini
We must approach with care the diffusion of technology, and correctly size up the potential threats. As there has been increased media attention on vulnerabilities within critical structures, the same approach must be followed to manage issues with commonly used devices...
March 13, 2012 Added by:Infosec Island Admin
Are you a Cyber Warrior and seeking a new employment opportunity? Don't miss the TECHEXPO Cyber Security hiring event March 20th. Bring resumes and interview for the many opportunities, and learn from our guest speakers William M. Jimenez, Paul de Souza, and Richard Bejtlich...
March 06, 2012 Added by:Headlines
Fox News reports that infamous LulzSec leader known as Sabu has been working with law enforcement for months to investigate key members of the anonymous movement, resulting in multiple arrests of key Anonymous conspirators...
February 19, 2012
Infosec Island's Javvad Malik will be on site at the Black Hat Europe conference in Amsterdam conducting video interviews and - no doubt - interjecting his trademark brand of humor while exploring cutting edge infosec trends and developments...
February 16, 2012 Added by:Jeffrey Carr
We should re-assess which attacks should be investigated and which should be let go. The FBI and US-CERT are overwhelmed with tracking everything from probes against government networks to DDoS attacks to targeted attacks against the Defense Industrial Base...
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015