Latest Blog Posts


Cloud computing: A Maneuvered Phrase !

February 11, 2010 Added by:K S Abhiraj

Cloud computing has become a huge ‘buzz-phrase’ in last few years, but you’d be forgiven for not knowing what the term actually means indeed. Different people interpret “cloud computing” in different ways. That’s the dilemma because computing “in the cloud” may be important for you and your organization, but if it’s not clear what it actually m...

Comments  (2)


Jester Unveils XerXeS Automated DoS Attack

February 10, 2010 Added by:Anthony M. Freed

Anti-jihadi hacker The Jester (th3j35t3r), continues his campaign against militant Islamic websites, and now reveals the development of an automated version of his DoS attack, which he calls the XerXeS project.

Comments  (4)


Security Consciousness Raising

February 06, 2010 Added by:Bill Wildprett, CISSP, CISA

I’ve been thinking about Security Awareness and different ways of teaching it as a mindset.  We infosec folks think about it all the time, cultivating it as part of our general focus on situational awareness; the general public, corporate and government leaders, SMBs – not as much, perhaps.

Comments  (1)


The 800-lb Dragon’s APTitude

February 06, 2010 Added by:Bill Wildprett, CISSP, CISA

I’ve been following the news about the Google hacks and ‘Operation Aurora‘ as McAfee called it, for a while.  There’s a plethora of online articles about this and why China would do this, which the PRC government denies pro forma.  It’s about nationalistic young Chinese and about PRC government, economic and military strategic interests.

Comments  (1)


More Talks with Anti-Jihadi Hacker The Jester

February 04, 2010 Added by:Anthony M. Freed

Anti-jihadi hactivist The Jester (th3j35t3r), the self-proclaimed Nicest Hacker in the World, has returned for part two of our conversation concerning his campaign of intermittent disruption of militant pro-jihad websites.

Comments  (1)


Eating your own dog food - how a Security Software company uses Security

February 04, 2010 Added by:Larry Ketchersid

Remember the gentleman in the commercial for Hair Club for men who said “I'm not only the President, but I'm a customer”? While there are days when the hair club tempts me, it is security solutions that my company, Media Sourcery, provides. And, like many of Infosec Island's members, the information, data and documents that we exchange with our customers are proprietary, confidential a...

Comments  (1)


Comet's Home Page

February 02, 2010 Added by:_ Comet

Some useful resources and links from one of our members

Comments  (2)


In Rebuke of China

February 02, 2010 Added by:Tom Schram

In the current issue of Foreign Affairs, former NATO Commander General Wesley K. Clark and current Department of Veteran Affairs CTO Peter Levin write:  “There is no form of military combat more irregular than an electronic attack: It is extremely cheap, is very fast, can be carrier out anonymously, and can disrupt or deny critical servi...

Comments  (3)


Hacktivist Tactics Raise Ethical Questions

January 27, 2010 Added by:Anthony M. Freed

Recently we have witnessed the emergence of international hactivist and vigilante “the Jester” through his crusade against jihadi and militant Islamic networks...Jester’s activities raise an important question:  Where do cyber vigilantes fall on the infosec ethics spectrum?

Comments  (19)


Consider Outsourcing Your Network Security

January 27, 2010 Added by:Ken Leeser

As more and more critical applications and services move to the cloud, organizations are increasingly receptive to the idea of using a managed security service to protect their network and information assets.

Comments  (1)


Is the Recent Chinese Google Hack the most Serious Privacy Breach of the Year?

January 21, 2010 Added by:Brent Carey

Last week Google announced that it was the victim of a hack in China. Word of the attack spread quickly and the German, French and Australian governments issued warnings about using internet Explorer. I'm amazed that this incident has not received more commentary from the privacy and security communities. Is this not   the most serious data privacy breach in a search engine’s histo...

Comments  (1)


Infosec Island™ Acquires

January 19, 2010 Added by:Infosec Island Admin

We are pleased to announce that Infosec Island™ has acquired, one of the leading online news portals addressing security issues. ISR's audience is predominantly CxO level decision makers from Fortune 500s, small and mid cap enterprise, aerospace, defense, government, health care, and education....

Comments  (2)

Ba5964a1284ac16d4277991e7225699c - Gets Rocked again - this time a PII Lawsuit

January 02, 2010 Added by:Jason Remillard

Well, its happened. This time, the users themselves have taken action against for their inadvertent disclosure of customer information. As we previously reported, Rockyou was hacked and disclosed it looks like over 32,000,000 accounts. Yes, 32 Million!

Comments  (1)


Road Map for an Application/Software Security Architect (Part 5)

December 30, 2009 Added by:Stephen Primost

Without a Digital Identity, how would you expect to do any authentication? And with an incomplete Digital Identity, how would you expect to get the authorization done correctly? Without the proper data model and the expectation that it would have the correct data (besides being in the right place at the right time), securing a system is impossible, although having the information, it is the easies...

Comments  (0)


So, you wanna network online too?

December 30, 2009 Added by:Fred Williams

I previously listed ways to gain valuable information on hacking targets using little work and no dumpster diving. The previous post was geared towards attacks computer systems but not human targets.What is a little more interesting is attacking specific people. This is one of the key issues behind Facebook' recent privacy issues. Never mind a user setting a "privacy filter" ...

Comments  (2)


So, you wanna post some personal data on the Internet?

December 26, 2009 Added by:Fred Williams

I've been reading the book Hacking the Next Generation by Dhanjani, Rios and Hardin and that got me to thinking.... The authors explain in the chapter "Intelligence gathering" that in order to execute a successful attack against a target, the attacker must gain as much intelligence about the target as possible.

Comments  (0)

« First < Previous | 474 - 475 - 476 - 477 - 478 | Next > Last »