Security Awareness

0dc5fdbc98f80f9aaf2b43b8bc795ea8

US at High Risk for Computer Attack

July 30, 2010 Added by:Global Knowledge

Seventy-four percent of respondents believe that a network attack on the government’s IT infrastructure is expected in the next year. While there is much to debate with regard to these findings, there is a need for greater network security...

Comments  (2)

98180f2c2934cab169b73cb01b6d7587

DTIC and IATAC- Resources for the War on Cyber Terrorism

July 30, 2010 Added by:Jon Stout

Originally developed in World War II as a resource on enemy technology, the DTIC has morphed into a valuable - if underutilized - tool for understanding the technology bases for enemy attacks...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Pay Attention to Credit Card Statements

July 29, 2010 Added by:Robert Siciliano

If a credit card company detects irregular spending on your credit card, they may freeze your account or call to verify your identity. While these measures do help secure your card to an extent, they cannot prevent or detect all types of credit card fraud...

Comments  (0)

1f2f664e68a603b3c54890fbbcd37857

Facebook Security

July 28, 2010 Added by:Mark Gardner

The volume of users and the lack of a suitable alternative means that this incident won't have far reaching consequences for Facebook. However, it may just place doubts in users minds that when a suitable alternative is available users may begin to switch...

Comments  (1)

98180f2c2934cab169b73cb01b6d7587

Vulnerability Management: The Changing Nature of Attacks

July 27, 2010 Added by:Jon Stout

Cyber terrorism, in addition to attacks on corporate networks, poses a direct threat to the U.S. military, civilian agencies and critical infrastructure. Because of the problems with attributing the attacks to the actual source, this threat has become difficult to contain...

Comments  (1)

16443e0c6f6e4a400fd0164b3c406170

Effective WiFi Neighborhood Watch Programs

July 26, 2010 Added by:Christopher Burgess

Neighborhood Watch groups typically focus on observation and awareness as a means of preventing crime and employ strategies that range from simply promoting social interaction and watching out for each other to active patrols by groups of citizens...

Comments  (0)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (004)

July 25, 2010 Added by:Christophe Veltsos

Who said: "Anyone who visits a social networking site should know that it's a business model. The service is not free. We users pay for it with our private data..."?

Comments  (1)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

NPR Report Warns of Cyberdefense Shortage

July 23, 2010 Added by:Global Knowledge

James Gosler, who worked at the CIA, the National Security Agency and the Energy Department, estimates that there are only 1,000 or so people in the United States who have the skills necessary to meet our computer security needs. Quite a deficit, no?

Comments  (5)

Af2769c2480db78c589b811b428782b0

Washington Post Launches Top Secret America

July 23, 2010 Added by:Lee Mangold

So let me ask the Islanders some questions: Do you think this is responsible reporting? Is it right to publish the locations of the Nations secrets to the world? If you're outside of the US, how would you feel about this in your country?

Comments  (4)

63b96d79afc327c98a13c614670feca0

Criminal Communication Infrastructure

July 20, 2010 Added by:Nathaniel Markowitz

One of the central challenges for cyber-criminals is how to communicate with their customers while also maintaining their anonymity. There are three main types of communication utilized by Bulletproof Hosts (BPHs)...

Comments  (0)

37d5f81e2277051bc17116221040d51c

What is “Swatting” And How Do I Protect My Family

July 16, 2010 Added by:Robert Siciliano

SWAT is Special Weapons and Tactics. Those are the guys and gals in all black with the headgear and big guns. Caller ID spoofing technologies are used as a tool to disguise the caller and send law enforcement officers on bogus calls...

Comments  (0)

1789975b05c7c71e14278df690cabf26

Getting Physical: Hot Summer Security

July 16, 2010 Added by:Pete Herzog

OSSTMM 3 requires that you don't look to the threat to prepare your security plan because it's too easy to only make changes which affect a small portion of the threats. That's especially true when you consider how unpredictable human behavior can be...

Comments  (10)

Ebb72d4bfba370aecb29bc7519c9dac2

SANS Essential Log Reports - Help Needed

July 15, 2010 Added by:Anton Chuvakin

Recently, I volunteered to create a 2010 version of SANS Top 5 Log Reports. With help from others and some research into past efforts, I have identified some report types and specific examples as candidates for a new Top 7 Essential Log Reports list – and now I need your help...

Comments  (8)

7fef78c47060974e0b8392e305f0daf0

An Introduction to OSSTMM Version 3

July 15, 2010 Added by:Infosec Island Admin

As a security consultant, I've always looked for ways to increase consistency, efficiency and value when conducting security analysis on a client's network or business. With the impending release of OSSTMMv3 I'll share my thoughts on the success of the model...

Comments  (19)

37d5f81e2277051bc17116221040d51c

Security Cameras Can Speak Volumes

July 15, 2010 Added by:Robert Siciliano

Cameras are everywhere. We are on camera at most retails stores, banks, ATMs, busy intersections, highways, downtown areas and in neighborhoods. It keeps the honest people honest and the bad guys in-check or in jail...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

HITB 2010 Amsterdam Keynote

July 14, 2010 Added by:Anton Chuvakin

The main theme of my speech was that we have essentially two securities - one where people do paper risk assessments, "align strategy" and enable business and another where people actually deal with consequences of intrusions and other burning technical issues...

Comments  (0)

Page « < 49 - 50 - 51 - 52 - 53 > »
Most Liked