THE IMPACT OF FEDERAL REGULATIONS ON THE INFORMATION ASSURANCE OF THE NORTH AMERICAN ELECTRICAL ENERGY GRID Part 1 of 2

THE IMPACT OF FEDERAL REGULATIONS ON THE INFORMATION ASSURANCE OF THE NORTH AMERICAN ELECTRICAL ENERGY GRID Part 1 of 2

THE IMPACT OF FEDERAL REGULATIONS ON THE INFORMATION ASSURANCE OF THE NORTH AMERICAN ELECTRICAL ENERGY GRID
May 20, 2015 | 0 comments | View Post
A Book Review of “Penetration Testing: A Hands-On Introduction to Hacking” by Georgia Weidman (@georgiaweidman)

A Book Review of “Penetration Testing: A Hands-On Introduction to Hacking” by Georgia Weidman (@georgiaweidman)

A Book Review of “Penetration Testing: A Hands-On Introduction to Hacking”
May 18, 2015 | 3 comments | View Post
The Internet of Toys and Games by @mhbjr for My Security Thoughts

The Internet of Toys and Games by @mhbjr for My Security Thoughts

Will law enforcement now send subpoenas for the audio and video recordings from Barbie? Will Mattel be subjected to National Security Letters?
Mar 04, 2015 | 1 comment | View Post
My Security Thoughts by @mhbjr

My Security Thoughts by @mhbjr

my current thoughts are on how cyber security is affected or will be affected by the automation and religion
Jan 29, 2015 | 0 comments | View Post
My Security Thoughts – A Panel Discussion

My Security Thoughts – A Panel Discussion

My Security Thoughts – A Panel Discussion

Cheating website subscribers included WH, Congress workers

Cheating website subscribers included WH, Congress workers

Cheating website subscribers included WH, Congress workers

Hackers Dump Ashley Madison User Database... Where Most People Won't Find It

Hackers Dump Ashley Madison User Database… Where Most People Won’t Find It

Hackers Dump Ashley Madison User Database… Where Most People Won’t Find It

Why AT&T's 'Willingness' To Help NSA Is Alarming

Why AT&T’s ‘Willingness’ To Help NSA Is Alarming

A posting from Dark reading  titled ” Why AT&T’s ‘Willingness’ To Help NSA Is Alarming” by Eric Zeman The NSA would have had a much more difficult time spying on Americans were it not for the comfortable, chummy partnership the government forged with AT&T, say new documents released by Edward Snowden. AT&T worked closely with the government […]

Richard Bejtlich Talks Business Security Strategy, US Security Policy

Richard Bejtlich Talks Business Security Strategy, US Security Policy

A video posting form Dark reading titled “Richard Bejtlich Talks Business Security Strategy, US Security Policy”  by Richard Bejtlich Chief security strategist of FireEye talks at the Dark Reading News Desk at Black Hat about what should really be driving your security department’s strategy. Plus he discusses law enforcement agencies’ efforts to put backdoors in […]

My Security Thoughts: Anonymity and Privacy, There is None Nor Should We Expect It

My Security Thoughts: Anonymity and Privacy, There is None Nor Should We Expect It

My Security Thoughts: Anonymity and Privacy, There is None Nor Should We Expect It

NICE (National Initiative for Cybersecurity Education) Conference 2015

NICE (National Initiative for Cybersecurity Education) Conference 2015

NICE (National Initiative for Cybersecurity Education) Conference 2015

SecurityBSides DC 1st Round Ticket Sales Open Now

SecurityBSides DC 1st Round Ticket Sales Open Now

SecurityBSides DC 1st Round Ticket Sales Open

NSA sets date for purge of surveillance phone records

NSA sets date for purge of surveillance phone records

A posting from NakedSecurity titled “NSA sets date for purge of surveillance phone records ” by  Lisa Vaas  The National Security Agency (NSA) has set a date to purge phone records collected during its bulk surveillance program. “Analytic access” to the five years worth of records will end on 29 November, and they’ll be destroyed […]

Code Theft: Protecting IP At The Source

Code Theft: Protecting IP At The Source

An interesting article from DarkReading titled “Code Theft: Protecting IP At The Source” by Anna Chiang.   Your corporate assets are at risk and every day that you avoid taking action shortens the time until your IP will be leaked. Here are six steps toward better data security. The security world is awash with various malware-centric cyber […]

Online Security: How The Experts Keep Safe

Online Security: How The Experts Keep Safe

An interning article titled “Online Security: How The Experts Keep Safe” from information week by Thomas Claburn. In the 1976 thriller Marathon Man, Nazi war criminal Dr. Christian Szell tortures runner “Babe” Levy to find out whether it’s safe for him to retrieve diamonds stored in a bank deposit box. “Is it safe?” Szell asks repeatedly. Levy, […]

iPhone Kill Switch: How Effective Is It?

iPhone Kill Switch: How Effective Is It?

An interesting article from Darkreading by Eric Zeman  titled ” iPhone Kill Switch: How Effective Is It?” My iPhone 6 Plus was picked from my pocket in Barcelona in March as I walked home from dinner one evening. After speaking to local police for a few moments, I ran back to my hotel to locate […]

Converge 2015 - Hacking To Get Caught - Keynote

Converge 2015 – Hacking To Get Caught – Keynote

Raphael Mudge, the creator of Armitage and Cobalt Strike, will talk about something awesome.

Bug exposes OpenSSH servers to brute-force password guessing attacks

Bug exposes OpenSSH servers to brute-force password guessing attacks

A bug in OpenSSH, the most popular software for secure remote access to UNIX-based systems, could allow attackers to bypass authentication retry restrictions and execute many password guesses.

Researchers Enlist Machine Learning In Malware Detection

Researchers Enlist Machine Learning In Malware Detection

A posting from dark reading by Kelly Jackson Higgins titled “Researchers Enlist Machine Learning In Malware Detection ” No sandbox required for schooling software to speedily spot malware, researchers will demonstrate at Black Hat USA. In 100 milliseconds or less, researchers are now able to determine whether a piece of code is malware or not — and […]

Windows 10 Will Use Virtualization For Extra Security

Windows 10 Will Use Virtualization For Extra Security

An interesting article from informationweek by Kelly Sheridan titled ”  Windows 10 Will Use Virtualization For Extra Security”   When we’re talking about Windows 10features, security upgrades are often edged out of the spotlight by flashy additions like Cortana for desktop, Microsoft Edge, and Universal Apps. Perhaps this is because Microsoft is targeting a broad consumer audience with […]

Ashley Madison Exposed: Affair Hookup Site Hacked, Member Data Posted Online

Ashley Madison Exposed: Affair Hookup Site Hacked, Member Data Posted Online

A posting from Dark Reading by Quick Hits titled ” Ashley Madison Exposed: Affair Hookup Site Hacked, Member Data Posted Online”   Member data pilfered, posted in apparent hacktivist-style doxing attack. Call it hacktivism with a spin: a controversial website for people seeking others who want to have an affair was hacked and personal details of its […]

Why Did A Security Firm Mysteriously Ditch a 'Privacy' Product?

Why Did A Security Firm Mysteriously Ditch a ‘Privacy’ Product?

A posting from Forbes by Yael Grauer titled “Why Did A Security Firm Mysteriously Ditch a ‘Privacy’ Product?” :   Two weeks after Ben Caudill announced that he’d built a $200 hardware proxy which allows Internet users to mask their location, the Rhino Labs owner shut down his project. His much anticipated August appearance at DEF CON, […]

Did Firefox listen to Facebook and just kill Flash? (No, but there's another patch!)

Did Firefox listen to Facebook and just kill Flash? (No, but there’s another patch!)

Did Firefox listen to Facebook and just kill Flash?

Dark Reading Radio: Firewall Smackdown

Dark Reading Radio: Firewall Smackdown

A posting from dark reading by  Marilyn Cohodas  titled firwall smackdown:   Is there a future for the venerable firewall? Join us for a debate between security CEOs Asaf Cidon of Sookasa and Jody Brazil of FireMon. Show time is Wednesday, July 15, 1:00 PM New York/10:00 AM San Francisco. In today’s  BYOD world there […]

Flash zero-day leaks out from "Hacking Team" hack, patch expected Real Soon Now

Flash zero-day leaks out from “Hacking Team” hack, patch expected Real Soon Now

An informative article by paul duckin titled  ” flash zero-day leak out from hacking team  hack, patch expected real soon” Wouldn’t you just know it! Last night we wrote about how Flash troubles come in threes, like those proverbial buses: An emergency update against targeted attacks, followed by… A concerted effort to milk that exploit […]

Cybercriminal Group Spying On US, European Businesses For Profit

Cybercriminal Group Spying On US, European Businesses For Profit

An informative article by  kelly jackson higgins  at dark reading   titled “Cybercriminal Group Spying On US, European Businesses For Profit” Symantec, Kaspersky Lab spot Morpho’ hacking team that hit Apple, Microsoft, Facebook and Twitter expanding its targets to lucrative industries for possible illegal trading purposes. A team of attackers tied to previous hacks of […]

Leaked Emails: How Hacking Team And US Government Want To Break Web Encryption Together

Leaked Emails: How Hacking Team And US Government Want To Break Web Encryption Together

An informative article by Thomas fox-brewster  about “Why China Wants Your Sensitive Data”: Get ready America: one of the most notorious surveillance providers on the planet, Hacking Team TISI NaN%, is expanding in earnest on US shores. And, if it hasn’t collapsed as a result of a hugely embarrassing attack on its servers, the likes of […]

When hackers get hacked: Secretive spy software team falls victim to attack

When hackers get hacked: Secretive spy software team falls victim to attack

An informative article by Laura Hautala at c|net titled “When hackers get hacked: Secretive spy software team falls victim to attack”: It seems no one is safe on the Internet. The latest example: hackers claimed to breach the files of Italian spy software company Hacking Team and then used the company’s own Twitter account to broadcast […]

Cloud & The Security Skills Gap

Cloud & The Security Skills Gap

An informative video on cloud and the security skill gap  from Darkreading.com   F5 Network security evangelist David Holmes offers concrete advice about how cloud outsourcing can help companies with a talent shortfall solve three enterprise security problems: application security, penetration testing, and bug bounties. To look at the video click here:  

Hillary Clinton: China hacks 'everything that doesn't move' in the US

Hillary Clinton: China hacks ‘everything that doesn’t move’ in the US

An informative article by Lee Munson at nakedsecurity.com titled “Hillary Clinton: China hacks ‘everything that doesn’t move’ in the US” US presidential hopeful Hillary Clinton has accused China of state-sponsored hacking designed to steal both trade secrets and government information. Speaking at a Fourth of July campaign rally in New Hampshire on Saturday, the former […]

Enterprise Log Management: An Overview (Part 2)

Enterprise Log Management: An Overview (Part 2)

Enterprise Log Management: An Overview (Part 2)

Page 1 of 3512345...102030...Last »
error: Content is protected !!