Category: Security Defitions

Richard Bejtlich Talks Business Security Strategy, US Security Policy

Richard Bejtlich Talks Business Security Strategy, US Security Policy

A video posting form Dark reading titled “Richard Bejtlich Talks Business Security Strategy, US Security Policy”  by Richard Bejtlich Chief security strategist of FireEye talks at the Dark Reading News Desk at Black Hat about what should really be driving your security department’s strategy. Plus he discusses law enforcement agencies’ efforts to put backdoors in […]

Why Did A Security Firm Mysteriously Ditch a 'Privacy' Product?

Why Did A Security Firm Mysteriously Ditch a ‘Privacy’ Product?

A posting from Forbes by Yael Grauer titled “Why Did A Security Firm Mysteriously Ditch a ‘Privacy’ Product?” :   Two weeks after Ben Caudill announced that he’d built a $200 hardware proxy which allows Internet users to mask their location, the Rhino Labs owner shut down his project. His much anticipated August appearance at DEF CON, […]

Phishing Overview in the United States

Phishing Overview in the United States

In United States, phishing is becoming one of the fastest evolving classes of identity theft scams on the Internet, causing both short-term losses and long-term economic damage. In a phishing scam, the identity thief poses as a legitimate person from a reputable company to try to entice people to visit bogus Web sites, where they are asked to reveal important personal information, such as credit card data. Although most phishing attacks target the financial industry, a growing number of phishing incidents target other sectors, such as retailers, online game operators and Internet Service Providers.

Information Security Definitions - Zero Day Attack (0 Zero Attack)

Information Security Definitions – Zero Day Attack (0 Zero Attack)

A zero-day attack or threat is a computer threat that tries to exploit unknown, undisclosed or unpatched computer application vulnerabilities. The term Zero Day is also used to describe unknown or Zero day viruses.

Zero-day exploits are released before the vendor patch is released to the public. Zero-day exploits generally circulate through the ranks of attackers until finally being released on public forums. The term derives from the age of the exploit. A zero-day exploit is usually unknown to the public and to the product vendor.

error: Content is protected !!