Week 26 in Review – 2012
Event Related Workshop on the Economics of Information Security 2012 – lightbluetouchpaper.org I’m liveblogging WEIS 2012, as I did in 2011, 2010 and 2009. The event is being held today and tomorrow at...
View ArticleTreadstone 71 and Utica College – Cyber Intelligence and Open Source
As an adjunct instructor of cyber intelligence (CYB610) and counterintelligence (CYB615) at Utica College, students use live exercises to supplement the academic readings and theories. Recently, the...
View ArticleCyberciminals launch managed SMS flooding services
By Dancho Danchev Mobile devices are an inseparable part of the modern cybercrime ecosystem. From ATM skimmers with SMS notification next to fake antivirus scanners for Android users, the growth of the...
View ArticleJob: Penetration Tester in Washington, DC
SecureState seems to be looking for a pen tester to perform ongoing services for a number of systems based on their status within C&A cycle, ATO status, and estimated risk. From what they are...
View ArticleHURRY! CITADEL IS GOING OFF THE OPEN MARKET!
Citadel – Yesterday and Today Citadel started as a Zeus v2 Trojan, deployed and tweaked by a crime gang using it for their own banking fraud operations, however once Citadel was released into the...
View ArticleAre you ready for your Green Belt in Attack Mitigation?
Knowledge Test Overview Wow! The Attack Mitigation Black Belt Challenge is only two weeks old and already we have dueling leaders and intense competition. People from all over the world are...
View ArticleDo not miss the warning signs – be prepared
It’s not just the Ukrainians and the Polish that are seeing a surge in demand as the Euro Championships take place. Here at Symantec, we have noticed some curious spikes in data usage, around the time...
View ArticleDespite New SEC Rule, Organizations Rarely Disclose Cyber Breaches
Hackers broke into computers at hotel giant Wyndham Worldwide Corp. three times in two years and stole credit card information belonging to hundreds of thousands of customers. Wyndham didn’t report...
View ArticleWhy You Need to Protect Your Application Layer
document.write(unescape("%3Ciframe src='http://www.facebook.com/plugins/like.php?href=" + document.URL +...
View ArticleTrust Matters Series issue 2
Risk matters…so does trust By Bryan K. Fite, BT Assure US & C Portfolio Manager Many organisations do not manage risk in a holistic way. Rather, they maintain silos of risk-management activity that...
View ArticleSSD price crash: 80¢ per GB! #HPIO for + Esther Schindler by + Richi...
SSD price crash: 80¢ per GB! #HPIO for +Esther Schindler by +Richi Jennings...SSD price crash: 80¢ per GB! - Input Output
View ArticleEurotrash MicroTRASH 29 – Mark Hillick talks GSE
Eurotrash MicroTRASH 29 - Mark Hillick talks GSE
View ArticleIntrusion Prevention System: First Line of Defense
In the past few years, advancements in technology have grown hand in hand with a substantial increase in hacking and cyber espionage. The whole world is deeply interconnected through the medium of......
View ArticleSocial Engineering – We Start Playing
If hacking is known as entering a computer system through a breach of security, social engineering can be referred to as an intrusion into the mind. That really is the basic meaning of social... Go on...
View ArticleThink Differently
For too long the information, security industry has looked at information homogenously and assumed that all hacking is created equally because all information is created equal. This could not be...
View ArticleThe LinkedIn – Dickensonian Reciprocity
Well crafted tale, worthy of Charles John Huffam Dickens, detailing the fascinating connection between the LinkedIn password fiasco and Charles Dickens. Highly Pickwickian. Ð
View ArticleAll Carberp botnet organizers arrested
We have already been tracking the Carberp cybercrime group’s activity for three years. Tracking started in 2009 with the first samples seen in the wild. The second wave of Carberp activity had forced...
View ArticleNitrozac and Snaggy: Venus of Willendorf
via the comic genius of Nitrozac and Snaggy at The Joy of Tech™
View ArticleUpcoming SANS Training Events
SecurityOrb.com offers a $150.00 discount on SANS training to our readers. Simply register for any SANS course using the following discount code: SecOrb_Connect ($150 off any SANS course in any format)
View Article