Blog Posts Tagged with "Search Engine"
The Deep Web vs. Network Security Monitoring
August 31, 2012 Added by:Dan Dieterle
The “Deep Web”, Dark Web or hidden internet, is a massive collection of sites and databases that don’t show up in standard search engines. So, is this a place that you want ANYONE on your corporate network to visit? NO WAY. Though many use Tor for legitimate purposes, the deep web just isn’t that kind of place...
Comments (3)
Yandex.ru Indexing Crawler Issues
August 30, 2012 Added by:Brent Huston
Sadly, many web crawlers and index bots do not honor the rules of robots.txt. Nor do attackers who are indexing your site for a variety of attack reasons. Given the impacts that some of these indexing tools can have on bandwidth, CPU use or database connectivity, other options for blocking them are sometimes sought...
Comments (1)
Shodan: There is Now an App for That
July 11, 2012 Added by:shawn merdinger
Since October, 2010, Shodan has consistently made waves in the information security world. Like any security tool, Shodan can be leveraged by both malicious attackers and legitimate security operations to gain insights into the public IP exposure of an organization. Now enters the Shodan App...
Comments (1)
What is the Deep Web? A Trip into the Abyss...
May 25, 2012 Added by:Plagiarist Paganini
The Deep Web is considered the place where everything is possible, you can find every kind of good and service for sale, but most of them are illegal. The hidden web offers cybercrime great business opportunities, hacking services, malware, stolen credit cards, weapons, etc...
Comments (0)
A History of Google's Government Sales
March 14, 2012 Added by:Jeffrey Carr
Every technology company sells to the government, and compared to Microsoft and Apple the google numbers are pretty low. But since Google is more intimate with our search habits and email content than anyone else, these statistics still make me a little uncomfortable...
Comments (0)
What Actually Changed in Google’s Privacy Policy
February 14, 2012 Added by:Electronic Frontier Foundation
Google did a great job of informing users that the privacy policy had been changed through emails and notifications. Unfortunately, while the policy might be easier to understand, Google did a less impressive job of publicly explaining what in the policy had actually been changed...
Comments (0)
The Next Generation Search Engine Hacking Arsenal
January 14, 2012 Added by:Plagiarist Paganini
LulzSec and Anonymous use Google Hacking as a means of identifying vulnerable targets, as it provides a complete and regularly updated source of sensitive info. Developers and sysadmins who want to deploy applications on cloud infrastructures should be aware...
Comments (0)
The Subtle Art of OSINT: Open-Source Intelligence
January 11, 2012 Added by:Infosec Island Admin
The use of OSINT has grown. Earlier on, these sources of information that were being culled and combed through by the likes of Langley, now can be easily done by the likes of you and I with a few tools on the web or applications that you can install on your machines at home...
Comments (1)
ICS-CERT: Control System Internet Accessibility Advisory
January 09, 2012 Added by:Headlines
The use of readily available and generally free search tools significantly reduces time and resources required to identify Internet facing control systems. In turn, hackers can use these tools to easily identify exposed control systems, posing an increased risk of attack...
Comments (0)
Western Companies in Collusion with Chinese Oppression
September 21, 2011 Added by:Headlines
"Entering into the Chinese market as a search engine or social media provider is an ethical mine field. In the hands of authorities determined to police their subjects, search engines and social media platforms such as Facebook can become a potent tool of online repression..."
Comments (0)
Google is Your Friend - If You're a Lulzer
June 29, 2011 Added by:Kevin McAleavey
There are exploit GUI's readily available for PostgreSQL, MSSQL and Oracle as well as lesser and older databases. If it's there, and they can find it, and they can talk to it, and you're not properly filtering what can get to it, your site could very well be the next breaking news story...
Comments (5)
Internet Overrun with Osama Bin Laden Malware Traps
May 02, 2011 Added by:Headlines
When the user clicks on the link, they will download a file titled XvidSetup.exe. This is actually a popular adware tool known as hotbar. At present, 19 of 41 antivirus engines are blocking the file. Sadly, there will be no shortage of scams taking advantage of this historic news...
Comments (0)
Completed Tax Forms Inadvertently Posted Online
April 11, 2011 Added by:Headlines
In the majority of the instances where Chapman found sensitive documents that were indexed and searchable, the owners of the information did not realize that by placing the information on family and/or business websites, they were making the information publicly accessible...
Comments (0)
Search Engine Doesn’t Need Kid's Social Security Numbers
April 06, 2011 Added by:Robert Siciliano
Americans have become accustomed to handing over the last four digits of their SSN as an identifier. The coder or marketer at Google who believes it’s reasonable to request the last four digits of children’s SSNs probably readily shares his or her number, which is not a good idea...
Comments (0)
One in Five Search Engine Topics Lead to Malware
March 03, 2011 Added by:Headlines
"Attackers focus on where they can get the most eyeballs and profit, and today that means social networks and search engines. As a community we often point to the need for user education as the missing component..."
Comments (0)
Infosec Insights: Getting Indexed via Twitter – Good and Bad
March 02, 2011 Added by:Brent Huston
Clearly, search engines aren’t the only types of automated applications watching the Twitter stream. My guess is that scanning engines watch it too, to some extent, and queue up hosts in a similar manner. Just like all things, there are good and bad nuances to the tweet to get indexed approach...
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization