Blog Posts Tagged with "Media"

0a8cae998f9c51e3b3c0ccbaddf521aa

Don't Get Lulzed - Three Tips for Avoiding Headline Hysteria

March 12, 2012 Added by:Rafal Los

What does the reported capture of the LulzSec hacking team leadership mean to the Internet? It means there will be a frenzy of jokes, outrage and sensationalism around this hacking group again. What does this reported capture mean to you in corporate security? Not a thing...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Sabu: The Latter Day Joey Pardella - Oh There Will be Lulz!

March 11, 2012 Added by:Infosec Island Admin

As the press is now digging into his past and finding all the fidly bits about Sabu, they turned up a big one in the fact that Monsegur attended Stuyvesant High in NYC, which is the very same high school where they filmed the cult hacker hit “Hackers” back in 1995. Smirk...

Comments  (1)

850c7a8a30fa40cf01a9db756b49155a

Advanced Persistent Threats: The Butler in China Did It

March 05, 2012 Added by:J. Oquendo

Aside from the attack coming from a Philips Electronics' Chinese-based IP block, I am positive that whoever was behind the attack was not an employee. Someone probably compromised a machine at Philips and was using it to attack the PBX I managed. Nothing more, and nothing less...

Comments  (0)

Ecadf7bc12303bf9d93a73b5ea4a6ace

Don't Be Naïve about Anonymous or the Occupy Movement

February 22, 2012 Added by:Robin Jackson

If you are an information security professional, then I urge you to quit worrying about what conferences you're going to speak at and get serious about shoring up the defenses of every computer system that you are responsible for immediately...

Comments  (4)

0a8cae998f9c51e3b3c0ccbaddf521aa

Will the Real IT Security Researcher Please Stand Up?

February 12, 2012 Added by:Rafal Los

Most security researchers are comfortable with identifying flaws and racing to be the first to find zero-day vulnerabilities. Is this productive? Isn’t erring human? If that is the case, why is it surprising to find flaws in new software or applications?

Comments  (2)

68b48711426f3b082ab24e5746a66b36

Security Weekly News Roundup: Tunnel Vision

February 11, 2012 Added by:Fergal Glynn

As security professionals do we all just suffer from “security tunnel vision” or is something major shifting in our industry? Is it all just related to the significant rise in hacktivism or the 24-hour news cycle requiring that every little thing become a news story?

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

All Out Cyber War: Analysis of the Middle-Eastern Conflict

January 29, 2012 Added by:Rafal Los

You just can't avoid it, so I had to write it. The escalation of rhetoric has gone past media hype and has spilled over into mainstream politics, and now onto the lips of people who should really know better than to perpetuate some of this madness...

Comments  (4)

7fef78c47060974e0b8392e305f0daf0

Take That Israel! All Your SCADA's Are Belong to Us!

January 20, 2012 Added by:Infosec Island Admin

The SCADA were not in default state for passwords, and in general did not seem to be important systems - like government or large power company hardware. Hell, for that matter, none were even water facilities, which I should think in a desert would be kinda important, no?

Comments  (2)

0a8cae998f9c51e3b3c0ccbaddf521aa

Plagiarism in IT Security - Walking a Fine Line

December 09, 2011 Added by:Rafal Los

At the end of the day, shouldn't we all be professionals? I know it's nice to think that everyone is honest - but as the infosec world expands and there is a massive influx of people trying to make a name for themselves - there will be dishonesty. This is where the community comes in...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

The Nature of Infosec: A Zero Sum Game

December 08, 2011 Added by:Infosec Island Admin

Security is a “Zero Sum Game” - no matter what you do, no matter how many policies you have or blinking lights on an appliance that is alleged to keep out APT, in the end you really have not won the day. In fact, if you have not been hacked or abused that day, it was really just a fluke...

Comments  (2)

7ca9cf570bb97d22b119f3a70d335ede

Printer Hack: Researchers Can Set Media’s Pants on Fire

December 07, 2011 Added by:Brian Smithson

What was most irresponsible in this case was that the researchers took their exploit of one model of printer from one manufacturer and without even a cursory investigation extrapolated the threat to “hundreds of millions” of printers and fed it to a media hungry for sensational headlines...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Russian Cyber Crime - Pride or Prejudice?

December 04, 2011 Added by:Danny Lieberman

“Why does every hacking and cyberscam story – real or fictional – seem to have a Russia connection? In part, it is prejudice and laziness. The stereotype of the Russian hacker has become such a common media trope that it gets recycled again and again..."

Comments  (0)

8c4834b99847b9f7c9ee94b45df086f9

Hackers: The Good, the Bad and the Ugly

November 07, 2011 Added by:Emmett Jorgensen

Hackers are often portrayed as social outcasts or criminals looking to defraud the unsuspecting public. The media frequently makes little or no distinction between hacker types, simply lumping them all together into a malevolent group. The truth is hackers come in all shapes and sizes...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Anonymous: Conflation, Synergy, Diffusion, and Spin

October 11, 2011 Added by:Infosec Island Admin

Anonymous’ use of technology comes naturally, as they formed online. It is with the growth of connectivity that the movement went viral. Some may say it was the targeting. I say the targeting was always there, but those who were feeling the miasma weren’t able to express it in normal ways...

Comments  (7)

Page « < 1 - 2 > »