Blog Posts Tagged with "FUD"

94c7ac665bbf77879483b04272744424

The Virtual Sky is Falling!

May 28, 2012 Added by:Marc Quibell

Opportunists are using an alarmists strategy, bolstered by bloated opinions, to get you to buy their stuff. IT Sec businesses and vendors are not objective sources for security trends, threats and/or events. They are advertisements...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Off Topic: What to do about Conspiracy Theorists?

May 21, 2012 Added by:Joel Harding

I received an alert recently about an article dealing with Electronic Warfare or EW. Since EW has always been one of the components of Information Operations I decided to take a look. Mistake. My very first indicator, before I even had to think, was that the title was in ALL CAPS...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Infosec is Not a Religion

May 14, 2012 Added by:Infosec Island Admin

Infosec is not a religion. There are no Cardinals, there are no Bishops, there are only a bunch of people who want their opinion to be heard and listened to ad nauseum. It’s as simple as that, and if you start clothing it in the robes of ecclesiastical rhetoric, you FAIL...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Project Enlightenment Attacks Reminiscent of Shady Rat

May 02, 2012 Added by:Headlines

“From a technical perspective, Project Enlightenment is another example of increasingly common cyber espionage activities. While the attack method was simple, it successfully compromised dozens of organizations and bypassed their existing security and detection measures...."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Open Source Code in the Enterprise - Keys to Avoiding Vulnerabilities

April 18, 2012 Added by:Rafal Los

There is no debate in the open vs. closed source software question. Either can be made well, or poorly. Either open source or closed source can be relatively secure, or riddled with easy-to-exploit holes. We don't need to rehash this, but there appears to be some new data...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Fear and Loathing in Infosec: A Savage Journey

April 17, 2012 Added by:Infosec Island Admin

The players mime their passion plays to obtain the almighty dollar and make their daily bread. Grimy hands slither over every inch of the client while pouring soothing words, cooing in their ear about how their solutions will cure ills and make them more virile than the next guy...

Comments  (1)

296634767383f056e82787fcb3b94864

China: Our Incompetent Master Adversary?

April 16, 2012 Added by:Jeffrey Carr

Either China is the greatest and dumbest adversary we've ever had, or the real dummies are those in infosec who can't be bothered to question the obvious when doing incident response, or who choose to cater to the rising tide of Sinophobia in the U.S. in order to boost their sale...

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

Patriot Hackers: Stand YOUR Ground - Not Mine

April 16, 2012 Added by:Ali-Reza Anghaie

Let’s not replicate the sins of our Governments. Let’s not aggravate the problems Governments face. I don't disregard the threats radicalization online brings. I'm suggesting Cyber Vigilantism is not a movement we want to support by throwing our Western weight behind it...

Comments  (21)

7fef78c47060974e0b8392e305f0daf0

Infosec: The Eternal Struggle

April 06, 2012 Added by:Infosec Island Admin

The military and the government movers and shakers are all moving with fear tinged with desire, for more control over the internet as a whole while the beltway bandits are all in the wings, like a murder of crows watching dark eyed, waiting for their moment to strike...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Coming Soon: FUD FUD FUD!

April 03, 2012 Added by:Infosec Island Admin

The terrorists may aspire to this, as nebulous as that aspiration can be from an image like the one in question. This in NO WAY means we are doomed or that NYC will be seeing an attack like 9/11 again directly relating to this piece of so called artwork...

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

Vendor Research: Look These Gift Horses in the Mouth

March 29, 2012 Added by:Jack Daniel

The problem is that a lot of the data leaves me wanting more. More details on the data we get, just plain “more data”, and more context. I also want more honesty about the shortcomings of the reports and data. Let’s not even talk about some of the bizarre conclusions...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Pentagon Networks Hacked 250,000 Per Year

March 21, 2012 Added by:Rafal Los

Unfortunately, I suspect that if this actually happened at the Pentagon a quarter million times a year, America would be in a much, much worse position than we are today. Our battle plans would be compromised, launch codes, schematics, and covert identities would be compromised...

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

A Post BSidesSF and RSA Post

March 15, 2012 Added by:Jack Daniel

The RSA Conference was the RSA Conference. It was better than the past few years as far as content. It is not the place for cutting edge research, and the expo is all about selling security products. It can be disillusioning to see the crass commercial side of our business...

Comments  (1)

850c7a8a30fa40cf01a9db756b49155a

The Emperor's Advanced Persistent Clothing

March 12, 2012 Added by:J. Oquendo

When "experts" start believing their own hodge-podge of "truths", it spreads like a cancer and ends up in the ears of decision makers. When will security pros stop focusing on marketing in hopes of selling shares of the Brooklyn Bridge and focus on actually securing something?

Comments  (3)

0a8cae998f9c51e3b3c0ccbaddf521aa

Don't Get Lulzed - Three Tips for Avoiding Headline Hysteria

March 12, 2012 Added by:Rafal Los

What does the reported capture of the LulzSec hacking team leadership mean to the Internet? It means there will be a frenzy of jokes, outrage and sensationalism around this hacking group again. What does this reported capture mean to you in corporate security? Not a thing...

Comments  (1)

850c7a8a30fa40cf01a9db756b49155a

How FUD Defends Against APT

March 08, 2012 Added by:J. Oquendo

We placed computers in the environment of our critical infrastructure that are responsible for the things like water, power, communications - but we never engineered security into the equation. We are looking at a magnificent attack in the next couple of months, even days or hours...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked