Network->General

D97bed96d5646177251e99b9567b1392

Biometrics: Where do we stand?

April 16, 2010 Added by:Aaron Simmons

New Hampshire recently voted down the bill (HB 1409) and sided with the Security Industry to allow Biometrics.  So now that security is becoming a priority, where does it stand in the role of Authentication Verification? There are several methods for verification, (Biometric, PIN, Token and even Telephone Call Back/SMS).  Each one of these has its pro’s ...

Comments  (2)

85ac6feb584b665e85664974c546cfec

How to Detect a Mac Flooding Attack

April 15, 2010 Added by:Ray Tan

Ever since the beginning of the Internet, we have been facing ever increasing threats which can affect the stability and usability of your network. Nowadays, our businesses rely on their networks and the Iinternet more and more, but how can we prevent being attacked by hackers?

Comments  (0)

85ac6feb584b665e85664974c546cfec

Troubleshooting networking using the OSI model

April 14, 2010 Added by:Ray Tan

When troubleshooting networking it is always sensible to approach the problem from the perspective of the OSI model. The OSI, or Open System Interconnection, model defines a networking framework for implementing protocols in seven layers. The beauty of this model is the fact that you can individually troubleshoot every layer using simple methods. I suggest working from layer 1 upwards until y...

Comments  (4)

E4b33dbe234685965beb3e9f2a0ad456

Google, Adobe, and Big Oil Attack Commonalities

March 07, 2010 Added by:Ted LeRoy

The work of protecting information is becoming more difficult with time.  The recently discovered attacks on Google, Adobe, Marathon Oil, ExxonMobil, and ConocoPhillips illustrate an alarming trend.  The attacks even gave rise to a new attack model, the Advanced Persistent Threat (APT).

Comments  (0)

Cc5b3987fdda8edb89d6f82eb0d64fed

Comet's Home Page

February 02, 2010 Added by:_ Comet

Some useful resources and links from one of our members

Comments  (2)

F6bae6ee0c7dfe5b62860cc8ebf311fe

Boole server - Data centric remote access, auditing and encryption

December 09, 2009 Added by:John England

Maintaining confidentiality and protection of data from unauthorized access are basic requirements for a security system. Boole Server is able to fulfil these protection requirements to a very high standard. Ease of use and versatility in configuration enables Boole Server to be the development platform delivering all the tools necessary for the complete protection of information circu...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Internet Security Alliance Delivers Cyber Security Report

December 03, 2009 Added by:Anthony M. Freed

Ssustainable improvements in our collective cyber security posture will stem from a comprehensive understanding of how to effectively motivate all players across our economic landscape to actively engage in proven best-practices in both their business and individual cyber activities...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Extremely Sensitive US Secrets Found on P2P Networks

July 29, 2009 Added by:Infosec Island Admin

According to an article released by the Washington Post today, private firm, Tiversa, Inc, discovered extremely sensitive information on global P2P Networks.

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Not So Smart Grid?

July 14, 2009 Added by:Infosec Island Admin

According to a security researcher, the so-called Smart Grid technology being rolled out accross the country as part of the stimulus bill, may be vulnerable to numerous attacks. According to the researcher, many of the commands that allow the power company to interact with the smart-meters at the user's house (for example) do not require authentication, have no encryption and are ripe fo...

Comments  (3)

6d117b57d55f63febe392e40a478011f

U.S.Banks Vulnerable to Sabotage

December 19, 2008 Added by:Anthony M. Freed

Democratic U.S. Rep. James Langevin of Rhode Island, who chairs the homeland security subcommittee on cybersecurity, said: “We’re way behind where we need to be now.” Dire consequences of a successful attack could include failure of banking or national electrical systems, he said...

Comments  (3)

Page « < 107 - 108 - 109 - 110 - 111 > »