General

37d5f81e2277051bc17116221040d51c

Companies Combine Efforts to Secure Data on USBs

June 27, 2010 Added by:Robert Siciliano

Kingston Digital, Inc., the Flash memory affiliate of Kingston Technology Company, Inc., the independent world leader in memory products, today announced that it will partner with security company BlockMaster and provide greater availability of centrally managed USB drives, which makes it easier to protect information on-the-move.

Comments  (2)

E9a8f256f4904b06246375df06a8864b

Password Hashing Salt- Should It Be Random?

May 24, 2010 Added by:Gaurav Kumar

Recently I had a discussion on whether password hashes salted with random bits are more secure than the one salted with guessable or known bits. Let's see: If the system storing password is compromised as well as the system which stores the salt, the attacker will have access to hash as well as salt, so whether the salt is random or not, doesn't matter.

Comments  (1)

2ca59fd9c3117f138e722e13597f2b0b

SSL VPN and return on investment. A possible combination

May 05, 2010 Added by:Dario Forte

At the current point in the history of information security, companies have spent a lot of time analyzing various options for remote access to their information systems. Many of them have begun with IPsec-based systems to interconnect different sites. It all seemed rather simple at first, but as the number of sites (and clients) that needed to be interconnected increased, scalability and inte...

Comments  (0)

85ac6feb584b665e85664974c546cfec

Network Attack Techniques – Network Sniffing

May 05, 2010 Added by:Ray Tan

One of the network’s features is that data are transmitted up and down through network pipes, from one piece of equipment to another.  That means when you try to send data to another computer, the data go through many network devices. We can use tracert command to help us understand how the packets travel among the devices.

Comments  (4)

6d117b57d55f63febe392e40a478011f

IslandPKI Engine Drives Secure Data Transfer for BlackBerry

April 13, 2010 Added by:Anthony M. Freed

Research In Motion (RIM) has announced the implementation of a secure data transfer application for its BlackBerry Smartphone using the same encryption protocol developed by Media Sourcery, which is the basis for Infosec Island's own IslandPKI service.

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

eBay: a hacker's source for acquiring remote monitoring medical devices for security testing?

April 13, 2010 Added by:shawn merdinger

I typically check eBay weekly for medical devices showing up, with an eye for anything with a network interface. Bluetooth-enabled devices abound, but the (mis-perception) that an attacker must be physically close decreases popular interest from a security testing perspective. In contrast, it's a box "on the wire" that enables an attacker in say, Palau, to to reach out and provide what I...

Comments  (1)

09e5dbdf8a3bd6dccce5621459b11e26

Vector 2 Data Sanitizing

April 08, 2010 Added by:Mark Bennett

Ever wonder if the data on your hard drive is recoverable after a format? Thinking about throwing out that old hard disk you don't need anymore? Perhaps selling the computer on EBAY? You lost a USB stick at the supermarket, but you think you are ok because you deleted the data previously? THINK AGAIN!

Comments  (0)

634ff692af43fd4dc5dab3b8590c77d6

Why bother with PGP ...???

April 04, 2010 Added by:K S Abhiraj

The very nature of email communication makes it perfect for spying and tapping. Imagine all the emails that fly across the Atlantic Ocean. Every single one of them could be tapped without you even noticing it. Of course, thinking that someone will sit and read every single one of them is preposterous - but the "problem" is that nobody has to.

Comments  (12)

A1579a5845ff87a92326174e52499707

Hackers Lurking in Hotel Networks

March 17, 2010 Added by:Mark Smail

Many frequent business travelers spend almost as many nights sleeping in hotels as they do in their own beds. The need to stay productive when you’re on the road means that travelers must rely on whatever means available to stay connected, even if it’s an unprotected hotel wireless network.  

Comments  (3)

7fef78c47060974e0b8392e305f0daf0

Complete Your Infosec Island Profile - Qualify to Win Over $10k in Services!

February 15, 2010 Added by:Infosec Island Admin

Don't miss out on your opportunity to win one of over $10k in service prizes in the Infosec Island Q1 Membership Drive!

Comments  (0)

426c2c140d842b9f9c538b204ff83a6d

Eating your own dog food - how a Security Software company uses Security

February 04, 2010 Added by:Larry Ketchersid

Remember the gentleman in the commercial for Hair Club for men who said “I'm not only the President, but I'm a customer”? While there are days when the hair club tempts me, it is security solutions that my company, Media Sourcery, provides. And, like many of Infosec Island's members, the information, data and documents that we exchange with our customers are proprietary, confidential a...

Comments  (1)

0f48ebb4a6ca02dbf5141affdbfa6898

It’s ‘Defense in Depth’, not ‘Dense in Depth’

December 18, 2009 Added by:Bill Wildprett, CISSP, CISA

I sit, dumbfounded with amazement after reading that insurgents in Iraq have been intercepting Predator drone video feeds and that the Pentagon has known about this for a year now.

Comments  (1)

B426b30042abbc15e363cb679bbc937d

More COFEE Please, on Second Thought…

November 09, 2009 Added by:Daniel Kennedy

The forensics tool provided to law enforcement officials created by Microsoft called COFEE  (Computer Online Forensic Evidence Extractor) has been leaked on torrents last week, and this has caused quite a bit of excitement.  Let’s see if the big deal is warranted.

Comments  (0)

B32b392ce3a707f05f4838c48c67d9cf

Should SSL be enabled on every website?

October 14, 2009 Added by:Christopher Hudel

Using SSL to secure all websites may seem like an odd choice; most websites contain no "nuggets" worth taking, SSL apparently slows the page load time (especially on over provisioned hosting platforms), and it's not clear if doing so will kibosh any search engine optimizations. 

Comments  (10)

6f611188ad4a81ffc2edab83b0705d76

Good Job!

October 09, 2009 Added by:Sandra Avery

CNN Money.com released its pick for the 50 best jobs in America.   IT won 3 of the 10 spots, with  Computer/Network Security Consultant coming in at number 8.  They describe the job as “protecting computer systems and networks against hackers, spyware, and viruses” and list pre-requisites for the job as “major geekdom”.

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Extremely Sensitive US Secrets Found on P2P Networks

July 29, 2009 Added by:Infosec Island Admin

According to an article released by the Washington Post today, private firm, Tiversa, Inc, discovered extremely sensitive information on global P2P Networks.

Comments  (0)

Page « < 6 - 7 - 8 - 9 - 10 > »