Digital Attack Map

/
Check out the Digital Attack Map. It was produced in a collaborative effort by Google Ideas and Arbor Networks to raise awareness about distributed denial of service attacks.

Google’s new service will show Animated map of DDoS attacks

/
Google’s new service will show Animated map of DDoS attacks

BarCamp Charlotte 8

/
We are excited to announce, not only a new partnership with CPCC and The Geek Fest but a new website too. With the new face lift we are hoping to provide you with a more informative and interactive website. If there is something you’d like to see on our website, contact us at barcampcharlotte@gmail.com.

Kali Linux Default Username and Password

/
During installation, Kali Linux allows users to configure a password for the root user. However, should you decide to boot the live image instead, the i386, amd64, VMWare and ARM images are configured with the default root password – “toor“, without the quotes.

(ISC)2 FREE Half-Day CAP® Credential Clinic

/
(ISC)2 is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers with Gold Standard certifications and world class training.

Security Flaw In Chrome May Leave Users’ Personal Information At Risk

/
In a blog posted last week, researchers at security firm Identity Finder outlined methods for accessing personal data from Chrome's History Provider Cache, even if the data has been entered on a secure website. Some data also may be accessible through Chrome's Web Data and History databases, the researchers say.

What is Two-Factor Authentication?

/
It is an authentication process where two of three recognized factors are used to identify a user: Something you know - usually a password, passcode, passphrase or PIN. Something you have - a cryptographic smartcard or token, a chip enabled bank card or an RSA SecurID-style token with rotating digits Something you are - fingerprints, iris patterns, voice prints, or similar

The C.I.A. Triad or C.I.A. Triangle and Other Security Concepts

/
Information security is the method of providing confidentiality, integrity and availability to data, information, applications and equipment for those who needs it. The key concept to providing such a level of protection falls on the concept of The C.I.A. triangle which consist of: – Confidentiality – Integrity – Availability

MIRcon 2013 – New Keynote Speakers Announced

/
Less Than One Month Until MIRcon 2013! We’ve been busy making sure that this year’s conference is the best one yet and look forward to welcoming you to MIRcon 2013 in just a few weeks. Here’s some information on the latest additions to the agenda and a few tips to make sure that you get the most out of the conference.

Blackhole Suspect Arrested in Russia

/
Russian authorities have arrested a man believed to be responsible for distributing a notorious software kit known as "Blackhole" that is widely used by cybercriminals to infect PCs, according to a person familiar with the situation.