“White Space” and a Possible Security Concern

September 23, 2010 admin 0

The FCC will be ruling on the usage of “White Space” for wireless networking access today (9/23/2010). White Space is the frequencies that are between television broadcast channels and many of them became free when TV broadcasters switched from analog signals to digital signals. […]

Stuxnet was a directed attack with insider knowledge expert says

September 22, 2010 admin 0

Stuxnet appeared on the scene earlier this summer, though it was written more than a year ago. The code, its mechanics, the way it moved from system to system using Zero-Day vulnerabilities in Windows, everything about it was both frightening and shady. The hype given to it was justified, if only because it was a targeted payload, aimed at critical infrastructure. […]

The EnCase Evidence File Format

September 20, 2010 admin 0

The EnCase evidence file can also be referred to as a forensic image file. The concept of an image file is where the entire drive contents of a target media is copied to a file […]

Creating a Comprehensive Vulnerability Assessment Program for a Large Company Using QualysGuard

September 17, 2010 admin 0

ulnerability Assessment, according to wikipedia.org, is the process of

identifying and quantifying vulnerabilities in a system. Vulnerability assessment

can be used against many different types of systems such as a home security

alarm, the protection of a nuclear power plant or a military outpost. Note that

vulnerability assessment is different from risk assessments even though they share

some of the same commonalities. Vulnerability Assessment concerns itself with

the identification of vulnerabilities, the possibilities of reducing those

vulnerabilities and improving the capacity to manage future incidents. This paper

will focus primarily on vulnerability assessment as it pertains to information

technology infrastructure and how utilizing QualysGuard can ease the burden on

your technology staff. […]

‘Here You Have’ Worm Runs Wild Hitting U.S. Organizations Hard

September 16, 2010 admin 0

Last week a hacker named, “Iraq resistance” who has been trying to unite other like-minded hackers in a cyber jihad effort towards US initiated a malicious computer worm know as the “Here you have” worm. A computer worm is a self-replicating malware computer program that uses computer networks to send copies of itself to other computers on a network without any user intervention. […]

1 2