Latest Blog Posts

B59a51a3c0bf9c5228fde841714f523a

How Twitter spam steals from Google, Yahoo!

March 06, 2010 Added by:Chester Wisniewski

Scammers have been devising ways to ride on someone else's coattails since the dawn of time. With every new technology they find another way to make money from nothing. Today I am going to highlight a method that involves Twitter, Yahoo!, and Google AdSense.

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Security Bloggers Wanted - Get Noticed - Get Hired in 2010!

March 05, 2010 Added by:Infosec Island Admin

The publishers of Infosec Island are now enrolling experienced network security professionals to become Island Bloggers and Forum Moderators. Register and complete your profile, and you will be elligible to win one of over $10,000 in products and services.

Comments  (11)

00fd6160b9db2d91e663a578d87cbaf3

Social Engineering at the White House and Your Enterprise

February 28, 2010 Added by:Wayde York

What does our enterprise information have in common with President Obama and Vice President Biden? The need for constant protection. Your enterprise data needs protection from the host of technical and human threats that seem to evolve daily. The President and Vice President require the same protection, albeit amplified due to their position in the world power scheme.

Comments  (0)

A3e8b5e0becdbfb1b1c706b452b6c388

Road Map for an Application/Software Security Architect (Part 6)

February 26, 2010 Added by:Stephen Primost

So, the application designer has disclosed that the solution for the web services being designed will involve the (1) need to authenticate; (2) need to determine levels of authorization; and (3) [by the way] need to have some personalized data be carried forward to the application. If you, as a the security architect involved in the security assessment process, are smart, you would have a security...

Comments  (0)

Cc5b3987fdda8edb89d6f82eb0d64fed

The first thing about security

February 23, 2010 Added by:_ Comet

My first blog post, Comet's Home Page, is a document that contains settings and freeware that I typically install on my own Windows machines.  The purpose of that page is to serve as a reference, because there are many things that only need to be done once on a new machine, such as installing software or tweaking internet connection limi...

Comments  (2)

6d117b57d55f63febe392e40a478011f

Exclusive Video of XerXeS DoS Attack

February 22, 2010 Added by:Anthony M. Freed

Infosec Island has gained exclusive access to a video demonstration of the XerXeS DoS attack as it is unleashed on the Taliban website www.alemarah.info, and carried out by infamous patriot hacker The Jester (th3j35t3r).

Comments  (10)

D5e39323dd0a7b8534af8a5043a05da2

Thanks for InfoSecIsland.com for an exciting training class.

February 22, 2010 Added by:Fred Williams

I thought I would post a quick blog on my training class information that I won through InfoSecIsland.com.  This proves that real people win contests on this great site.  If you ever get the opportunity to sign up for a contest here, you should do it.

Comments  (3)

0f48ebb4a6ca02dbf5141affdbfa6898

The Dragon’s Lair?

February 21, 2010 Added by:Bill Wildprett, CISSP, CISA

An excellent article in the N.Y. Times on February 18th stated that two Chinese schools, the Shanghai Jiaotong University and the Lanxiang Vocational School were involved in the recent online attacks against Google and dozens of other U.S. corporations.  These conclusions come...

Comments  (1)

0f48ebb4a6ca02dbf5141affdbfa6898

Flattery is in the Eye of the Beholder

February 19, 2010 Added by:Bill Wildprett, CISSP, CISA

Some very interesting research came to my attention the other day, courtesy of the ISC2.org CISSPforum on Yahoo Groups, pointing to an article in Scientific American that discussed why flattery is effective.

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Enhanced Authentication Now Available on Infosec Island

February 17, 2010 Added by:Infosec Island Admin

Infosec Island™, the new community for IT and information security professionals, today announced that its new enhanced authentication service based on the SyferLock™ GridGuard™ solution, is now live.

Comments  (5)

7fef78c47060974e0b8392e305f0daf0

Complete Your Infosec Island Profile - Qualify to Win Over $10k in Services!

February 15, 2010 Added by:Infosec Island Admin

Don't miss out on your opportunity to win one of over $10k in service prizes in the Infosec Island Q1 Membership Drive!

Comments  (0)

D5e39323dd0a7b8534af8a5043a05da2

De-cloaking in Internet Explorer

February 13, 2010 Added by:Fred Williams

I ran across a pretty interesting article on RSnake's blog about using a URL to get users to disclose personal information. I tested this in IE8 and the posting claims it works in IE6 and IE7 as well.  I tested in Firefox with and without NoScripts enabled and it doesn't work.  Yay Firefox!

Comments  (5)

634ff692af43fd4dc5dab3b8590c77d6

Cloud computing: A Maneuvered Phrase !

February 11, 2010 Added by:K S Abhiraj

Cloud computing has become a huge ‘buzz-phrase’ in last few years, but you’d be forgiven for not knowing what the term actually means indeed. Different people interpret “cloud computing” in different ways. That’s the dilemma because computing “in the cloud” may be important for you and your organization, but if it’s not clear what it actually m...

Comments  (2)

6d117b57d55f63febe392e40a478011f

Jester Unveils XerXeS Automated DoS Attack

February 10, 2010 Added by:Anthony M. Freed

Anti-jihadi hacker The Jester (th3j35t3r), continues his campaign against militant Islamic websites, and now reveals the development of an automated version of his DoS attack, which he calls the XerXeS project.

Comments  (4)

0f48ebb4a6ca02dbf5141affdbfa6898

Security Consciousness Raising

February 06, 2010 Added by:Bill Wildprett, CISSP, CISA

I’ve been thinking about Security Awareness and different ways of teaching it as a mindset.  We infosec folks think about it all the time, cultivating it as part of our general focus on situational awareness; the general public, corporate and government leaders, SMBs – not as much, perhaps.

Comments  (1)

0f48ebb4a6ca02dbf5141affdbfa6898

The 800-lb Dragon’s APTitude

February 06, 2010 Added by:Bill Wildprett, CISSP, CISA

I’ve been following the news about the Google hacks and ‘Operation Aurora‘ as McAfee called it, for a while.  There’s a plethora of online articles about this and why China would do this, which the PRC government denies pro forma.  It’s about nationalistic young Chinese and about PRC government, economic and military strategic interests.

Comments  (1)


« First < Previous | 471 - 472 - 473 - 474 - 475 | Next > Last »