Latest Videos

B64e021126c832bb29ec9fa988155eaf

Security Onion Intrusion Detection System Setup Tutorial

January 25, 2012

Run this on a system that has two network cards and you have a complete NSM/IDS. One NIC connects to your network or internet side of your traffic and monitors every packet, the second NIC connects to your LAN side and can be used to remotely view and monitor intrusion attempts...

Comments  (2)

99edc1997453f90eb5ac1430fd9a7c61

Do Not Encrypt Passwords - Why, You Ask?

January 12, 2012

Encrypting passwords is bad. Try hashing them with a little bit of salt on top. Confused about the terminology - maybe i can clear your confusion with the use of a shoe, a box and a pen & paper...

Comments  (2)

B64e021126c832bb29ec9fa988155eaf

Malware Analysis: How to Decode JavaScript Obfuscation

January 05, 2012

When performing malware analysis one of the techniques the bad guys uses to hide their code is obfuscation. What this means is that the program is hidden or obscured to make malware analysis much more difficult. You didn’t think they would make it easy on you did they?

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

On Input Validation

December 29, 2011

Input validation is a good security principle based on your application looking at what’s being asked of it and deal in a secure manner. It’s not always fool proof, but goes a long way...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Happy Holidays from Infosec Island

December 23, 2011

Happy Holidays from the Infosec Island staff. Anthony, Andrian, Lance and Mike wish you the best for this Holiday season. Thanks to everyone for coming to this site and a special thanks to all of our authors the contributors.

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

A Look at Infosec Island

December 18, 2011

Rather than giving a security roundup or predicting future security trends for 2012, I thought it a good idea to look at some of the security bloggers over at Infosec Island over the course of the year...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

Passwords: Give Them the Respect They Deserve

December 16, 2011

Passwords are everywhere on the internet. You need them to log onto your banking, emails and a ton of other websites. They are extremely important, yet do we give them the respect they deserve?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Cybersecurity in Waste Water and Water Control Systems

December 14, 2011

The first of a monthly webinar series on Industrial Control System (ICS) Cybersecurity is now available for review in this video. This session provides insight for those interested in ICS Cybersecurity including policy makers, asset owners, vendors, consultants and integrators....

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Santa Gets Hacked - Naughty List Leaked (video)

December 09, 2011

Breaking News (video): Networks at the North Pole have been breached by unidentified hackers leading to the disclosure of sensitive data - Santa's naughty list. Don’t worry – your secrets are safe! Included is a list of the things we really think are just that - a little bit naughty...

Comments  (3)

99edc1997453f90eb5ac1430fd9a7c61

Avoiding Security Budget Cuts

November 28, 2011

Companies are cutting back on information security departments budgets. I have, however, come up with an ingenious plan by which security departments can keep their funding without costing the company any money whatsoever. I’m pretty sure no-one has come up with this idea before...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Definition of a Real Security Consultant

November 11, 2011

No longer are arms or industrial might the measure of a country’s superiority, it resides within the information it holds. So if you have information that needs protecting and nobody else can help, you know what to do... just use a suitable encryption algorithm to render it unreadable...

Comments  (1)

6d117b57d55f63febe392e40a478011f

Hacker Halted: Conference Director Leonard Chin

November 08, 2011

Leonard was instrumental in the conceptualization and organization of EC-Council's first Hacker Halted Conference in the United States in 2008 and has been the conference director for this conference series since then. From Myrtle Beach in 2008, he brought the event to Miami...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted: Jeremiah Grossman on Hacking Websites

November 06, 2011

"Fundamentally the answer to the software security question can be found through metrics. By carefully tracking and analyzing metrics, very particular key performance indicators (KPIs), an organization can determine where resources would be best invested..."

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted: Mike Dahn and Martin McKeay on Compliance in the Cloud

November 03, 2011

"Your management fears the auditors more than the hackers. So why is it they're looking at moving cardholder data so quickly? Because 'cloud computing' is the new marketing buzzword that promises to do everything..."

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted: Charlie Miller on Battery Firmware Hacking

November 02, 2011

Researchers are only recently considering the security implications of multiple processors, multiple pieces of embedded memory, etc. Dr. Charlie Miller, principal research consultant for Accuvant and four time Pwn2Own winner, discusses Battery Firmware Hacking at the Hacker Halted Conference...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted: Moxie Marlinspike on SSL Authenticity

November 01, 2011

An in-depth examination of the current problems with authenticity in SSL, some of the recent high-profile SSL infrastructure attacks in detail, and some strategies to definitively fix the disintegrating trust relationships at the core of this fundamental protocol...

Comments  (1)


« First < Previous  | 4 - 5 - 6 - 7 - 8 |   Next > Last »