Sophos Reveals Assessment On Threat Landscape In Security Threat Report 2012
2011 was characterized by a rise in cybercrime
View ArticleDome9 Unveils Industry First Multi-Cloud Security Groups
Functionality consolidates security management across multiple cloud servers
View ArticleMobile Marketing Association Releases Final Privacy Policy Guidelines For...
Guidelines addresses the core privacy issues and data processes of many mobile applications
View ArticleImplementing Message Record Management Exch 2010
I was recently working on a project that involved creating some Retention policies for our Exchange 2010 sp1 environment. The project got a bit scary in the testing phase when we realized that the...
View Articleentrepreneur.com compromised with CrimePack
Today, Websense® ThreatSeeker® Network alerted us that entrepreneur.com has been compromised by cyber criminals, resulting in potentially malicious content being downloaded to a user's machine....
View ArticlePerspective on the EU Data Privacy Proposal
The EU has come out with a data protection proposal. First, the good stuff: The new EU privacy law takes a good step forward for privacy. The ability to control and even delete individual data profiles...
View ArticleSophos Security Threat Report 2012 – seeing through the hype
We know you're probably sceptical of "state of the world" reports from vendors. For all you can tell, they'll turn out to be thinly-digsuised advertorial, unreconstructed product brochures, or worse....
View ArticleReport: Hackers Breach Northwest Railway Systems by Disrupting Signal System
In yet another dangerous escalation of hackers sabotaging infrastructure, an alleged attack from overseas disrupted service on three unnamed Pacific Northwest railway lines. In the attack, the hackers...
View ArticleNetBIOS spoofing for attacks on browsers
Sometime ago during pentest NetBIOS protocol got my attention. Especially, NetBIOS naming and its co-work with DNS.NetBIOS is an old protocol, distributed world-wide, but it doesn’t have many security...
View ArticleA Conversation with Richard Clarke – Part I
Following a dramatic increase in the number and severity of breaches in 2011, Chris Wysopal and internationally-renowned security expert Richard Clarke discuss the changing cyber threat environment,...
View ArticleReserve Your Personal 10 Minute Briefing at IAPD/IPRA with an ADT Security...
This year, The Illinois Association of Park Districts and Illinois Park and Recreation Association will once again sponsor the state’s annual Soaring to New Heights Conference from January 26-28 at the...
View ArticleChuck Norris is NOT dead – beware the Facebook scam!
Messages have been spread on Facebook claiming to link to a video news report of the death of awesome martial arts film star Chuck Norris.
View ArticleWorld Economic Forum: Shaping New Risk Models
By Tara Savage, Senior Marketing Manager, BT Global Services Today’s business, economic, government and social climates are driven by data. Sharing information is fundamental to how states and...
View ArticleMaster the Cloud – putting sanity into this "cloud" thing
Over the border, watch me run ...look out Canada because here I come! If the cloud is somewhere on your radar for 2012 (and let's face it, who's radar is it not on?) and you happen to live north of...
View ArticleEncryption Controversy Continues
As you may have heard, the controversy over whether a court can compel an individual to disclose the encryption key for an encrypted drive continues. In this latest chapter, a district court in...
View ArticleAcunetix WVS 8 Released Candidate Now Available!
We are pleased to announce a Release Candidate (RC) of the much-awaited Acunetix Web Vulnerability Scanner, version 8. This build fixes issues that were reported during the Beta stages of development...
View ArticleWho exploits "Brand Me"? Is customer power sufficient?
We have had much publicity for the policy changes made by Google and Facebook. This morning l received a LinkedIn message from the former Head of Information Security of a global multinational...
View ArticleSymbian still number one
According to the data from statcounter.com, the Symbian operating system is still more popular than the ones that we hear about in the news so much: iOS and Android. That might change in a year or so,...
View ArticleTSA: Targeted Train Systems Hack (Maybe, Possibly – Oh, OK, We’re Just...
NextGov’s Aliya Sternstein is reporting a Transportation Security Admnistration [TSA] memo detailing an alleged system intrusion [attacking a Pacific Northwest rail company’s systems], and subsequent...
View ArticleTop 5 Tips To Make Social Engineering Your Career
Chris Hadnagy Over the last year social engineering has gotten a lot of press. From the attacks on companies like Sony, HB Gary, PBS, Citibank et al to contests like the Social Engineering CTF at...
View Article