Blog Posts Tagged with "Media"

7fef78c47060974e0b8392e305f0daf0

Cyberwar, Cyberdouchery, and Where the Rubber Meets the CyberRoad

October 01, 2012 Added by:Infosec Island Admin

The cyberwar is upon us and we had best start taking it seriously because people in power are making plans, and like biological warfare, it seems perhaps there could be unforeseen circumstances that could trigger bigger and worse things. Plan accordingly and think a bit more cogently...

Comments  (2)

888605c6c25c19e41bbbb986ea6d43c1

Top Hats For Everyone!

September 11, 2012 Added by:Jim Palazzolo

If you give public attention to your adversary, the stronger they get. We keep using terms like “Hacker” and “Black Hat”. I understand the need to classify the behavior. However, are we inadvertently giving individuals too much inherited power by recognizing them in context and connotation?

Comments  (2)

0a8cae998f9c51e3b3c0ccbaddf521aa

Throwing Stones in Glass Houses: Views on the Security Industry

August 26, 2012 Added by:Rafal Los

The Information Security industry is rife with negativity. Why are we so quick to pile on to others' pain? Isn the security community just more cynical by nature, is it psychological? Are we wired this way? As an industry, our goal is to create more resilient, more secure' and more defensible postures for everyone...

Comments  (1)

94ae16c30d35ee7345f3235dfb11113c

Thoughts On a U.S. Cyber Militia

August 23, 2012 Added by:Joel Harding

The Swiss are standing up a cyber command and they say their cyber warriors will be armed. Why wouldn’t this work in the US? First, we don’t trust our people as much as the Swiss. That is the nature of our culture, especially in the US. We are more paranoid, cynical and negative. We tend to micromanage...

Comments  (4)

99edc1997453f90eb5ac1430fd9a7c61

On Secploitation...

August 14, 2012 Added by:Javvad Malik

To honour the new found love-affair the media has with security, I predict Hollywood will jump on the Secploitation bandwagon, so I’ve done the hard work and come up with some sample titles. If you’re a producer or director and need scripts, get your people to give my people a call. We can work something out...

Comments  (1)

8e6e3972318ff74b194801340248199e

Security Information Addict

August 12, 2012 Added by:Scott Thomas

Part of the infosec profession is staying abreast of news and events. You need to know what attacks are going on in order to know how to defend against them. The problem with this is that it consumes all your free time. What you start to realize though, is you become addicted to information overload...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Don’t Freak Out, It was Only DefCon

July 31, 2012 Added by:Brent Huston

Disregard tales of drunken hackers menacing Vegas hotels, changing signs and doing social engineering attacks. They are good for amusement and awareness, but they are NOT really useful as a lens for viewing your organization’s risk or the steps you should be taking to protect your data. Instead, stick to the basics...

Comments  (1)

54a9b7b662bfb0f0445d1661d7ed180b

All is Fair in Love and Cyber War

July 27, 2012 Added by:Jayson Wylie

Whether it is financial fraud, economic damage, R&D or Intellectual property loss, espionage for a competitive edge or turning the centrifuges on high, these are all instances of code that cause damage, and it’s too late to say who started it...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Security Factions: Roosters and Owls

July 11, 2012 Added by:Infosec Island Admin

We have lobbying going on between two factions and all too often, the roosters are the ones being heard with their cry that the apocalypse is upon us, our water supply has been hacked, our power grid is a spiders thread away from utter collapse and youu my friend, are about to be plunged back into a zombie apocalypse...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Are Enterprises Really Hacking the Hackers?

June 27, 2012 Added by:Rafal Los

Active defense is using technology which can confuse an attacker, mislead them into spending time on worthless parts of an application, or slowing the response rate of the network or application down. That's active defense. Striking back involves actually going on the offensive, which is likely highly illegal...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Sabu: The Anonymous Zeitgeist?

June 27, 2012 Added by:Infosec Island Admin

If Sabu was so loved by anonymous and approved of, then they have completely abdicated their core beliefs in operations and set themselves up for the fall that came with Sabu’s arrest and subsequent rolling over on everyone in the “movement” that have spawned all of the arrests we are now seeing come to trial...

Comments  (2)

850c7a8a30fa40cf01a9db756b49155a

Flame: Cutting Through Media and SME Hype

June 14, 2012 Added by:J. Oquendo

Flame is a very loud piece of malware. It is a horrendous 20Mb contraption which screams: "look at me." Many of the components in Flame are borrowed, re-hashed, re-written and re-deployed. AV companies are suggesting there is "no financial gain" being sought by Flame and to that I state: "How would you know?"

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Is Lord Sugar a Member of Anonymous?

May 18, 2012 Added by:Javvad Malik

I’m simply asking the question that if Lord Sugar read something he didn’t agree with, and instead of privately sharing his thoughts or being in any way constructive, why did he expose the email address of Kevin OSullivan and invited 2 million people to DDoS his inbox?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

AQ, AQAP, BVD Bombs, CIA, INSPIRE, Media, Moles... Oh My

May 09, 2012 Added by:Infosec Island Admin

Al-Qaeda has a plan to leverage the internet even more than they already are. I believe they will continue to put the magazine out and perhaps inspire others to make clones. The ubiquitous nature of the internet will only serve to allow their propaganda to be loosed upon us all...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Anonymous Reloaded: Yesterday, Today, and Tomorrow

May 04, 2012 Added by:Pierluigi Paganini

Anonymous must be analyzed with a multidisciplinary approach, it is an amorphous creature that quickly changes and is able to adapt its behavior to the context needed for successful attacks, thanks to the large and heterogeneous participation in its collective...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Coming Soon: FUD FUD FUD!

April 03, 2012 Added by:Infosec Island Admin

The terrorists may aspire to this, as nebulous as that aspiration can be from an image like the one in question. This in NO WAY means we are doomed or that NYC will be seeing an attack like 9/11 again directly relating to this piece of so called artwork...

Comments  (0)

Page « < 1 - 2 > »
Most Liked