Infosec Island

B64e021126c832bb29ec9fa988155eaf

US Formally Charges Chinese Military Officials for Hacking

May 19, 2014 Added by:Dan Dieterle

For years China has turned to hacking to close the technology gap between them and other nations. Termed “cyber-espionage”, Chinese hackers targeted hi-tech US companies and stole confidential research and development data.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

EFF to the United Nations: Protect Individuals Right to Privacy in The Digital Age

March 10, 2014 Added by:Electronic Frontier Foundation

We call upon the Human Rights Committee to note the thirteen 13 International Principles for the Application of Human Rights to Communications Surveillance...as a guidance for understanding a State Party’s compliance with Article 17 on the right to privacy.

Comments  (0)

Default-avatar

Security Bloggers Network Social Security Awards 2014 Finalists Announced

January 30, 2014 Added by:Joe Franscella

The Security Blogger Network (SBN), the largest collection of information-security-focused blogs and podcasts in the world, has announced the SBN Social Security Awards 2014 finalists.

Comments  (0)

3026fa994d431ada923190b72e84fda4

The Evolving Value of Event Data for Effective Security

November 26, 2013 Added by:Danny Banks

Innovative enterprise security teams realize the importance of security event data and are changing the way they collect and store information for greater insight into the threat landscape.

Comments  (0)

54b393d8c5ad38d03c46d060fa365773

Security Advisor Alliance, A Nonprofit of Elite CISOs giving back to the community.

November 12, 2013 Added by:Jason Clark

Security Advisor Alliance is a nonprofit group of Top security leaders from the Global 1000 who have come together to donate time each week to help our peers in any area of security as a pro-bono service.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Belgacom Hack, State-sponsored Attack Hypothesis

September 18, 2013 Added by:Pierluigi Paganini

Belgacom hack, the telecommunications company found evidence of digital intrusion in the company systems, many experts believe in a state-sponsored attack.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Sabu Incited State-sponsored Attack for US Government

September 02, 2013 Added by:Pierluigi Paganini

Former LulzSec leader Sabu (Hector Xavier Monsegur) accused by the hacker Jeremy Hammond to have incited state-sponsored attack for the U.S. Government.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security and Terrorism – See Something, Say Something

August 08, 2013 Added by:Jon Stout

he existing cyber security computing model of the past decade, based on firewalls, anti-viral services, intrusion detection controls, etc., is no longer adequate to help organizations mitigate cyber-security risk.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security Failures: Value of the Human Firewall

August 07, 2013 Added by:Jon Stout

The computing security model of the past decade, based on firewalls, anti-viral services, intrusion detection controls, system event monitoring, VPNs, etc., is failing to detect and block the most advanced malware. That is serious enough. But what’s worse is that this traditional defense model is of little use in preventing what many experts feel is the greatest threat to cyber security: human e...

Comments  (0)

Default-avatar

Gen. Alexander Can’t Access Daughters' Emails, Says NSA Only Interested in Terrorists

August 01, 2013 Added by:Joe Franscella

On Wednesday, National Security Agency (NSA) Director General Keith Alexander informed a rather tame crowd (with the exception of one or two hecklers) that his agency isn’t interested in phone or other digital communications unless they impact foreign intelligence gathering or involve known or suspected terrorists. A day later a couple’s home was raided after the husband and wife searched “p...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security and Social Engineering – A True Case Study

August 01, 2013 Added by:Jon Stout

There are powerful integrated security dashboards that can be installed and modified to meet each user’s particular needs. Now a company can create hundreds if not thousands of employee cyber warriors with a relatively small investment.

Comments  (0)

Default-avatar

Black Hat News Storm Underway; Cisco, Big Card Hacks Also Making Hay

July 26, 2013 Added by:Joe Franscella

Black Hat USA 2013 (@blackhatevents) kicks off Saturday, running through next Wednesday – what a busy and exciting time for everyone in the cybersecurity industry and the news and PR machines.

Comments  (0)

Default-avatar

PhishMe Hopes to Reel in Originality, Persuasiveness, Realism; Wins Own Contest by Default

July 26, 2013 Added by:Joe Franscella

Northern Virginia-based startup @PhishMe, a company that has made a good name for itself as a cloud-based phishing email penetration tester and trainer, announced an interesting contest on its blog last week called the “The Double Barrel Throwdown 2013.”

Comments  (0)

Default-avatar

Cybersecurity vs. Cyber Security: When, Why and How to Use the Term

July 17, 2013 Added by:Joe Franscella

“Cybersecurity” and “cyber security” are getting more and more mixed usage lately, so much that they are becoming almost as ambiguous as the term “cloud” was a few years back. While there isn't any recognized authority on the subject per se, there are at least some credible sources providing guidance that can help those of us in the industry to decide on "when, why and how" to use the ...

Comments  (2)

53692ae1a8e713373b8a487ce89ee3e2

The New Facebook Graph Search: How You’re Helping Hackers Gather Information

July 15, 2013 Added by:Tom Eston

Check your privacy settings to make sure your private information doesn’t easily show up in Facebook’s new search engine

Comments  (1)

Default-avatar

Trend Spotting @BlackHatEvents: Did I Mention the Irony @BrianKrebs is Bringing?

July 01, 2013 Added by:Joe Franscella

How often do cybersecurity reporters like to tell attack victims' stories? How often are victims willing to go on record about them? Answers: frequently and never.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »