Blog Posts Tagged with "FUD"


Cybersecurity, Scare Tactics, and Sacrificing Privacy

July 13, 2012 Added by:Electronic Frontier Foundation

Efforts to break the partisan stalemate over the Cybersecurity Act, a bill that would allow Internet companies to monitor the communications of users and pass that data to the government without any judicial oversight, have backers of the bill attempting to drum up fears about catastrophic cyberattacks...

Comments  (0)


Security Factions: Roosters and Owls

July 11, 2012 Added by:Infosec Island Admin

We have lobbying going on between two factions and all too often, the roosters are the ones being heard with their cry that the apocalypse is upon us, our water supply has been hacked, our power grid is a spiders thread away from utter collapse and youu my friend, are about to be plunged back into a zombie apocalypse...

Comments  (1)


Security Vendors: Absit Reverentia Vero

July 09, 2012 Added by:

Vendors are driven to sell and sell at all costs. Product features stagnate, services under perform. We the customers suffer and the security postures of all organizations plummets. Adversaries can spend less on penetration innovation while at the same time more easily bypass our defenses...

Comments  (0)


Security Slide Rules

June 29, 2012 Added by:Wendy Nather

First off, there must be a slide talking about The Problem We All Face and that it’s a scary, scary world out there, otherwise I would forget why we’re all here. Next, there must be a slide that includes icons of people, the cloudernet, and either monitors or CPUs. Extra points for creatively drawn bad guys...

Comments  (0)


Talking to Your Management Rationally About Malware

June 28, 2012 Added by:Brent Huston

Malware with comparisons to Stuxnet are all the rage these days. Much of what is in the media is either hysteria, hype, confusion or outright wrong. As an infosec practitioner, your job is to explain to folks in a rational way about the trends and topics in the news carefully, truthfully, and rationally...

Comments  (0)


Are Enterprises Really Hacking the Hackers?

June 27, 2012 Added by:Rafal Los

Active defense is using technology which can confuse an attacker, mislead them into spending time on worthless parts of an application, or slowing the response rate of the network or application down. That's active defense. Striking back involves actually going on the offensive, which is likely highly illegal...

Comments  (1)


Sabu: The Anonymous Zeitgeist?

June 27, 2012 Added by:Infosec Island Admin

If Sabu was so loved by anonymous and approved of, then they have completely abdicated their core beliefs in operations and set themselves up for the fall that came with Sabu’s arrest and subsequent rolling over on everyone in the “movement” that have spawned all of the arrests we are now seeing come to trial...

Comments  (2)


Tweeting About Cyberwar and Other Ridiculous Ideas

June 19, 2012 Added by:Infosec Island Admin

I have said this before and I am saying it again, we are just monkeys with digital guns. Fools with tools really. I am afraid of the level of hubris here and frankly feel that it’s almost time to just become a Luddite. At least Luddites won’t be compromised by their toasters because China made malware to p0wn us...

Comments  (2)


Is There Such a Thing as Too Much Security?

June 18, 2012 Added by:Lee Munson

People who are in the computer security business are using too many scare tactics. Instead of informing the customer properly they are trying to scare them into using the company’s products. That is never a good thing and it is the reason why we have so much of a backlash going on now...

Comments  (2)


Flame: Cutting Through Media and SME Hype

June 14, 2012 Added by:J. Oquendo

Flame is a very loud piece of malware. It is a horrendous 20Mb contraption which screams: "look at me." Many of the components in Flame are borrowed, re-hashed, re-written and re-deployed. AV companies are suggesting there is "no financial gain" being sought by Flame and to that I state: "How would you know?"

Comments  (0)


The Fear Factor in Information Security

June 13, 2012 Added by:DHANANJAY ROKDE

Vendors are increasingly using the fear factor and coarse tactics to pressure information security managers into deploying rather unnecessary technologies and products. Why have we never heard of a vendor pitch claiming responsibility of failure to protect a company’s infrastructure?

Comments  (0)


Flame On: Cry Havoc and Let Loose the Dogs of Cyberfoolery

June 08, 2012 Added by:Infosec Island Admin

It is comical that there are calls in the Senate to investigate the “leaks and leakers” who talked to Sanger about their digital daring do Stuxnet. All you really need to do Mr. Senator is walk up to 1600 Pennsylvania Ave and knock on the oval office door. You can find the leaker there I can assure you...

Comments  (2)


The Myth of the CIA and the Trans-Siberian Pipeline Explosion

June 07, 2012 Added by:Jeffrey Carr

If you repeat a rumor often enough, it becomes a fact. Such is the case with the oft-repeated rumor the CIA was responsible for the Trans-Siberian pipeline explosion in 1982 by sabotaging the SCADA system. The latest iteration of that rumor was in the Washington Post's special report on cybersecurity called Zero Day...

Comments  (0)


Google's Worst Security Idea Ever

June 06, 2012 Added by:Jeffrey Carr

Google announced that it will notify a subset of its Gmail customers if they're the victim of a State-sponsored attack. Google's advice is FUD-inducing for people who aren't targets and insufficient for those who are. I have to wonder what Google was thinking when it created this awful program...

Comments  (0)


Flamer: I Can Haz Propaganda...

May 31, 2012 Added by:J. Oquendo

Studies on malware by vendors are not being done for anything other than being able to state: "We can defend you from MalwareX if you purchase Product Y." This is the reality of it. What better mechanism to do so than to paint the boogeyman as a rogue country. After all, countries spend millions on security...

Comments  (0)


The Next War on Terror Will Be (Lost) Online

May 31, 2012 Added by:Ali-Reza Anghaie

Consider we might be putting our cyber soldiers on the wrong line. Sure, there are growing ranks of cyber counter-terrorism practitioners across both private and public space, except that's only to meet the enemy we really want to see - the one that suits perhaps what we're comfortable doing or getting funding for...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »