March 17, 2014 Added by:Joe Weiss
I believe the only means for cyber threats to cause long term and wide-spread grid failure is through compromising the control systems of facilities leading to physical damage of long-lead time critical equipment such as transformers and turbines.
March 13, 2014 Added by:Vince Kornacki
TCPDUMP is extremely useful for monitoring network traffic when debugging applications and performing penetration tests. Unfortunately Android mobile devices do not include the TCPDUMP program. However, do not despair.
March 04, 2014 Added by:Pierluigi Paganini
Another mass compromise of small office/home office (SOHO) wireless routers has been uncovered by researchers from security firm Team Cymru.
February 27, 2014 Added by:Electronic Frontier Foundation
A bill co-sponsored by Reps. Kevin Yoder, Tom Graves, and Jared Polis—HR 1852, The Email Privacy Act—seeks to update ECPA by requiring a probable cause warrant whenever the government wants to access your online private messages.
February 19, 2014 Added by:Anton Chuvakin
One of the key uses for threat intelligence (TI) data is making better threat intelligence data out of it.
February 18, 2014 Added by:Anton Chuvakin
Sure, I admire the ability of attackers to find all the opportunities for amplification DDoS. DNS – check, NTP – check, SNMP – pending… However, I definitely can not hold the the same admiration for the “defenders” (if they can be called that) who still allow spoofed packets to leave their networks.
February 17, 2014 Added by:Brent Huston
There is no easier way to shut down the interest of a network security or IT administrator than to say the word "monitoring." You can just mention the word and their faces fall as if a rancid odor had suddenly entered the room! And I can’t say that I blame them.
February 03, 2014 Added by:Rob Fuller
There are some great discussions on the NoVA Hackers mailing list. One such discussion was about what the best way to do dns hostname brute forcing was and which tool is better than another. For me, I just use the command line and then parse the results (or just ask the deepmagic.com database ;–)
January 28, 2014 Added by:Patrick Oliver Graf
The convergent trends of BYOD, the consumerization of IT and mobility are causing rapid shifts in employees’ expectations for their work environment. Employees are driving the change by working remotely and on their own devices resulting in the workplace itself becoming increasingly flexible.
January 27, 2014 Added by:Electronic Frontier Foundation
Some people have condemned last week’s court decision to reject the bulk of the Federal Communications Commission’s (FCC) Open Internet Order as a threat to Internet innovation and openness. Others hailed it as a victory against dangerous government regulation of the Internet. Paradoxically, there is a lot of truth to both of these claims.
January 27, 2014 Added by:Anthony M. Freed
The attackers used a spear-phishing email designed to look like it was sent by the country’s Shin Bet secret security service which contained a malicious attachment that infected the systems with the Xtreme RAT software, a remote access tool.
January 27, 2014 Added by:Brent Huston
BIA (business impact analysis) is traditionally seen as part of the business continuity process. It helps organizations recognize and prioritize which information, hardware and personnel assets are crucial to the business so that proper planning for contingency situations can be undertaken.
Israeli Military and Hamas trade Hacking Att... Adnan Ayber on 07-25-2014
Don’t Let Your Guard Down: Tragedies Pave ... shahbaz ocpfsd1 on 07-25-2014
FCC Seeks Public Comment on Mobile Data Coll... taylor white on 07-24-2014