Companies Combine Efforts to Secure Data on USBs

June 27, 2010 Added by:Robert Siciliano

Kingston Digital, Inc., the Flash memory affiliate of Kingston Technology Company, Inc., the independent world leader in memory products, today announced that it will partner with security company BlockMaster and provide greater availability of centrally managed USB drives, which makes it easier to protect information on-the-move.

Comments  (2)


Password Hashing Salt- Should It Be Random?

May 24, 2010 Added by:Gaurav Kumar

Recently I had a discussion on whether password hashes salted with random bits are more secure than the one salted with guessable or known bits. Let's see: If the system storing password is compromised as well as the system which stores the salt, the attacker will have access to hash as well as salt, so whether the salt is random or not, doesn't matter.

Comments  (1)


SSL VPN and return on investment. A possible combination

May 05, 2010 Added by:Dario Forte

At the current point in the history of information security, companies have spent a lot of time analyzing various options for remote access to their information systems. Many of them have begun with IPsec-based systems to interconnect different sites. It all seemed rather simple at first, but as the number of sites (and clients) that needed to be interconnected increased, scalability and inte...

Comments  (0)


Network Attack Techniques – Network Sniffing

May 05, 2010 Added by:Ray Tan

One of the network’s features is that data are transmitted up and down through network pipes, from one piece of equipment to another.  That means when you try to send data to another computer, the data go through many network devices. We can use tracert command to help us understand how the packets travel among the devices.

Comments  (4)


IslandPKI Engine Drives Secure Data Transfer for BlackBerry

April 13, 2010 Added by:Anthony M. Freed

Research In Motion (RIM) has announced the implementation of a secure data transfer application for its BlackBerry Smartphone using the same encryption protocol developed by Media Sourcery, which is the basis for Infosec Island's own IslandPKI service.

Comments  (0)


eBay: a hacker's source for acquiring remote monitoring medical devices for security testing?

April 13, 2010 Added by:shawn merdinger

I typically check eBay weekly for medical devices showing up, with an eye for anything with a network interface. Bluetooth-enabled devices abound, but the (mis-perception) that an attacker must be physically close decreases popular interest from a security testing perspective. In contrast, it's a box "on the wire" that enables an attacker in say, Palau, to to reach out and provide what I...

Comments  (1)


Vector 2 Data Sanitizing

April 08, 2010 Added by:Mark Bennett

Ever wonder if the data on your hard drive is recoverable after a format? Thinking about throwing out that old hard disk you don't need anymore? Perhaps selling the computer on EBAY? You lost a USB stick at the supermarket, but you think you are ok because you deleted the data previously? THINK AGAIN!

Comments  (0)


Why bother with PGP ...???

April 04, 2010 Added by:K S Abhiraj

The very nature of email communication makes it perfect for spying and tapping. Imagine all the emails that fly across the Atlantic Ocean. Every single one of them could be tapped without you even noticing it. Of course, thinking that someone will sit and read every single one of them is preposterous - but the "problem" is that nobody has to.

Comments  (12)


Hackers Lurking in Hotel Networks

March 17, 2010 Added by:Mark Smail

Many frequent business travelers spend almost as many nights sleeping in hotels as they do in their own beds. The need to stay productive when you’re on the road means that travelers must rely on whatever means available to stay connected, even if it’s an unprotected hotel wireless network.  

Comments  (3)


Complete Your Infosec Island Profile - Qualify to Win Over $10k in Services!

February 15, 2010 Added by:Infosec Island Admin

Don't miss out on your opportunity to win one of over $10k in service prizes in the Infosec Island Q1 Membership Drive!

Comments  (0)


Eating your own dog food - how a Security Software company uses Security

February 04, 2010 Added by:Larry Ketchersid

Remember the gentleman in the commercial for Hair Club for men who said “I'm not only the President, but I'm a customer”? While there are days when the hair club tempts me, it is security solutions that my company, Media Sourcery, provides. And, like many of Infosec Island's members, the information, data and documents that we exchange with our customers are proprietary, confidential a...

Comments  (1)


It’s ‘Defense in Depth’, not ‘Dense in Depth’

December 18, 2009 Added by:Bill Wildprett, CISSP, CISA

I sit, dumbfounded with amazement after reading that insurgents in Iraq have been intercepting Predator drone video feeds and that the Pentagon has known about this for a year now.

Comments  (1)


More COFEE Please, on Second Thought…

November 09, 2009 Added by:Daniel Kennedy

The forensics tool provided to law enforcement officials created by Microsoft called COFEE  (Computer Online Forensic Evidence Extractor) has been leaked on torrents last week, and this has caused quite a bit of excitement.  Let’s see if the big deal is warranted.

Comments  (0)


Should SSL be enabled on every website?

October 14, 2009 Added by:Christopher Hudel

Using SSL to secure all websites may seem like an odd choice; most websites contain no "nuggets" worth taking, SSL apparently slows the page load time (especially on over provisioned hosting platforms), and it's not clear if doing so will kibosh any search engine optimizations. 

Comments  (10)


Good Job!

October 09, 2009 Added by:Sandra Avery

CNN released its pick for the 50 best jobs in America.   IT won 3 of the 10 spots, with  Computer/Network Security Consultant coming in at number 8.  They describe the job as “protecting computer systems and networks against hackers, spyware, and viruses” and list pre-requisites for the job as “major geekdom”.

Comments  (0)


Extremely Sensitive US Secrets Found on P2P Networks

July 29, 2009 Added by:Infosec Island Admin

According to an article released by the Washington Post today, private firm, Tiversa, Inc, discovered extremely sensitive information on global P2P Networks.

Comments  (0)

Page « < 6 - 7 - 8 - 9 - 10 > »