General
Companies Combine Efforts to Secure Data on USBs
June 27, 2010 Added by:Robert Siciliano
Kingston Digital, Inc., the Flash memory affiliate of Kingston Technology Company, Inc., the independent world leader in memory products, today announced that it will partner with security company BlockMaster and provide greater availability of centrally managed USB drives, which makes it easier to protect information on-the-move.
Comments (2)
Password Hashing Salt- Should It Be Random?
May 24, 2010 Added by:Gaurav Kumar
Recently I had a discussion on whether password hashes salted with random bits are more secure than the one salted with guessable or known bits. Let's see: If the system storing password is compromised as well as the system which stores the salt, the attacker will have access to hash as well as salt, so whether the salt is random or not, doesn't matter.
Comments (1)
SSL VPN and return on investment. A possible combination
May 05, 2010 Added by:Dario Forte
At the current point in the history of information security, companies have spent a lot of time analyzing various options for remote access to their information systems. Many of them have begun with IPsec-based systems to interconnect different sites. It all seemed rather simple at first, but as the number of sites (and clients) that needed to be interconnected increased, scalability and inte...
Comments (0)
Network Attack Techniques – Network Sniffing
May 05, 2010 Added by:Ray Tan
One of the network’s features is that data are transmitted up and down through network pipes, from one piece of equipment to another. That means when you try to send data to another computer, the data go through many network devices. We can use tracert command to help us understand how the packets travel among the devices.
Comments (4)
IslandPKI Engine Drives Secure Data Transfer for BlackBerry
April 13, 2010 Added by:Anthony M. Freed
Research In Motion (RIM) has announced the implementation of a secure data transfer application for its BlackBerry Smartphone using the same encryption protocol developed by Media Sourcery, which is the basis for Infosec Island's own IslandPKI service.
Comments (0)
eBay: a hacker's source for acquiring remote monitoring medical devices for security testing?
April 13, 2010 Added by:shawn merdinger
I typically check eBay weekly for medical devices showing up, with an eye for anything with a network interface. Bluetooth-enabled devices abound, but the (mis-perception) that an attacker must be physically close decreases popular interest from a security testing perspective. In contrast, it's a box "on the wire" that enables an attacker in say, Palau, to to reach out and provide what I...
Comments (1)
Vector 2 Data Sanitizing
April 08, 2010 Added by:Mark Bennett
Ever wonder if the data on your hard drive is recoverable after a format? Thinking about throwing out that old hard disk you don't need anymore? Perhaps selling the computer on EBAY? You lost a USB stick at the supermarket, but you think you are ok because you deleted the data previously? THINK AGAIN!
Comments (0)
Why bother with PGP ...???
April 04, 2010 Added by:K S Abhiraj
The very nature of email communication makes it perfect for spying and tapping. Imagine all the emails that fly across the Atlantic Ocean. Every single one of them could be tapped without you even noticing it. Of course, thinking that someone will sit and read every single one of them is preposterous - but the "problem" is that nobody has to.
Comments (12)
Hackers Lurking in Hotel Networks
March 17, 2010 Added by:Mark Smail
Many frequent business travelers spend almost as many nights sleeping in hotels as they do in their own beds. The need to stay productive when you’re on the road means that travelers must rely on whatever means available to stay connected, even if it’s an unprotected hotel wireless network.
Comments (3)
Complete Your Infosec Island Profile - Qualify to Win Over $10k in Services!
February 15, 2010 Added by:Infosec Island Admin
Don't miss out on your opportunity to win one of over $10k in service prizes in the Infosec Island Q1 Membership Drive!
Comments (0)
Eating your own dog food - how a Security Software company uses Security
February 04, 2010 Added by:Larry Ketchersid
Remember the gentleman in the commercial for Hair Club for men who said “I'm not only the President, but I'm a customer”? While there are days when the hair club tempts me, it is security solutions that my company, Media Sourcery, provides. And, like many of Infosec Island's members, the information, data and documents that we exchange with our customers are proprietary, confidential a...
Comments (1)
It’s ‘Defense in Depth’, not ‘Dense in Depth’
December 18, 2009 Added by:Bill Wildprett, CISSP, CISA
I sit, dumbfounded with amazement after reading that insurgents in Iraq have been intercepting Predator drone video feeds and that the Pentagon has known about this for a year now.
Comments (1)
More COFEE Please, on Second Thought…
November 09, 2009 Added by:Daniel Kennedy
The forensics tool provided to law enforcement officials created by Microsoft called COFEE (Computer Online Forensic Evidence Extractor) has been leaked on torrents last week, and this has caused quite a bit of excitement. Let’s see if the big deal is warranted.
Comments (0)
Should SSL be enabled on every website?
October 14, 2009 Added by:Christopher Hudel
Using SSL to secure all websites may seem like an odd choice; most websites contain no "nuggets" worth taking, SSL apparently slows the page load time (especially on over provisioned hosting platforms), and it's not clear if doing so will kibosh any search engine optimizations.
Comments (10)
Good Job!
October 09, 2009 Added by:Sandra Avery
CNN Money.com released its pick for the 50 best jobs in America. IT won 3 of the 10 spots, with Computer/Network Security Consultant coming in at number 8. They describe the job as “protecting computer systems and networks against hackers, spyware, and viruses” and list pre-requisites for the job as “major geekdom”.
Comments (0)
Extremely Sensitive US Secrets Found on P2P Networks
July 29, 2009 Added by:Infosec Island Admin
According to an article released by the Washington Post today, private firm, Tiversa, Inc, discovered extremely sensitive information on global P2P Networks.
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization