Latest Blog Posts

7fef78c47060974e0b8392e305f0daf0

Enhanced Authentication Now Available on Infosec Island

February 17, 2010 Added by:Infosec Island Admin

Infosec Island™, the new community for IT and information security professionals, today announced that its new enhanced authentication service based on the SyferLock™ GridGuard™ solution, is now live.

Comments  (5)

7fef78c47060974e0b8392e305f0daf0

Complete Your Infosec Island Profile - Qualify to Win Over $10k in Services!

February 15, 2010 Added by:Infosec Island Admin

Don't miss out on your opportunity to win one of over $10k in service prizes in the Infosec Island Q1 Membership Drive!

Comments  (0)

D5e39323dd0a7b8534af8a5043a05da2

De-cloaking in Internet Explorer

February 13, 2010 Added by:Fred Williams

I ran across a pretty interesting article on RSnake's blog about using a URL to get users to disclose personal information. I tested this in IE8 and the posting claims it works in IE6 and IE7 as well.  I tested in Firefox with and without NoScripts enabled and it doesn't work.  Yay Firefox!

Comments  (5)

634ff692af43fd4dc5dab3b8590c77d6

Cloud computing: A Maneuvered Phrase !

February 11, 2010 Added by:K S Abhiraj

Cloud computing has become a huge ‘buzz-phrase’ in last few years, but you’d be forgiven for not knowing what the term actually means indeed. Different people interpret “cloud computing” in different ways. That’s the dilemma because computing “in the cloud” may be important for you and your organization, but if it’s not clear what it actually m...

Comments  (2)

6d117b57d55f63febe392e40a478011f

Jester Unveils XerXeS Automated DoS Attack

February 10, 2010 Added by:Anthony M. Freed

Anti-jihadi hacker The Jester (th3j35t3r), continues his campaign against militant Islamic websites, and now reveals the development of an automated version of his DoS attack, which he calls the XerXeS project.

Comments  (4)

0f48ebb4a6ca02dbf5141affdbfa6898

Security Consciousness Raising

February 06, 2010 Added by:Bill Wildprett, CISSP, CISA

I’ve been thinking about Security Awareness and different ways of teaching it as a mindset.  We infosec folks think about it all the time, cultivating it as part of our general focus on situational awareness; the general public, corporate and government leaders, SMBs – not as much, perhaps.

Comments  (1)

0f48ebb4a6ca02dbf5141affdbfa6898

The 800-lb Dragon’s APTitude

February 06, 2010 Added by:Bill Wildprett, CISSP, CISA

I’ve been following the news about the Google hacks and ‘Operation Aurora‘ as McAfee called it, for a while.  There’s a plethora of online articles about this and why China would do this, which the PRC government denies pro forma.  It’s about nationalistic young Chinese and about PRC government, economic and military strategic interests.

Comments  (1)

6d117b57d55f63febe392e40a478011f

More Talks with Anti-Jihadi Hacker The Jester

February 04, 2010 Added by:Anthony M. Freed

Anti-jihadi hactivist The Jester (th3j35t3r), the self-proclaimed Nicest Hacker in the World, has returned for part two of our conversation concerning his campaign of intermittent disruption of militant pro-jihad websites.

Comments  (1)

426c2c140d842b9f9c538b204ff83a6d

Eating your own dog food - how a Security Software company uses Security

February 04, 2010 Added by:Larry Ketchersid

Remember the gentleman in the commercial for Hair Club for men who said “I'm not only the President, but I'm a customer”? While there are days when the hair club tempts me, it is security solutions that my company, Media Sourcery, provides. And, like many of Infosec Island's members, the information, data and documents that we exchange with our customers are proprietary, confidential a...

Comments  (1)

Cc5b3987fdda8edb89d6f82eb0d64fed

Comet's Home Page

February 02, 2010 Added by:_ Comet

Some useful resources and links from one of our members

Comments  (2)

34200746591339726df9791b17bc885c

In Rebuke of China

February 02, 2010 Added by:Tom Schram

In the current issue of Foreign Affairs, former NATO Commander General Wesley K. Clark and current Department of Veteran Affairs CTO Peter Levin write:  “There is no form of military combat more irregular than an electronic attack: It is extremely cheap, is very fast, can be carrier out anonymously, and can disrupt or deny critical servi...

Comments  (3)

6d117b57d55f63febe392e40a478011f

Hacktivist Tactics Raise Ethical Questions

January 27, 2010 Added by:Anthony M. Freed

Recently we have witnessed the emergence of international hactivist and vigilante “the Jester” through his crusade against jihadi and militant Islamic networks...Jester’s activities raise an important question:  Where do cyber vigilantes fall on the infosec ethics spectrum?

Comments  (19)

1e44bd91360d3c685c3d78efcf0bea2e

Consider Outsourcing Your Network Security

January 27, 2010 Added by:Ken Leeser

As more and more critical applications and services move to the cloud, organizations are increasingly receptive to the idea of using a managed security service to protect their network and information assets.

Comments  (1)

F0a7d979c6e57d746e1164ed6e44678e

Is the Recent Chinese Google Hack the most Serious Privacy Breach of the Year?

January 21, 2010 Added by:Brent Carey

Last week Google announced that it was the victim of a hack in China. Word of the attack spread quickly and the German, French and Australian governments issued warnings about using internet Explorer. I'm amazed that this incident has not received more commentary from the privacy and security communities. Is this not   the most serious data privacy breach in a search engine’s histo...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Infosec Island™ Acquires Information-Security-Resources.com

January 19, 2010 Added by:Infosec Island Admin

We are pleased to announce that Infosec Island™ has acquired www.information-security-resources.com, one of the leading online news portals addressing security issues. ISR's audience is predominantly CxO level decision makers from Fortune 500s, small and mid cap enterprise, aerospace, defense, government, health care, and education....

Comments  (2)

Ba5964a1284ac16d4277991e7225699c

Rockyou.com - Gets Rocked again - this time a PII Lawsuit

January 02, 2010 Added by:Jason Remillard

Well, its happened. This time, the users themselves have taken action against rockyou.com for their inadvertent disclosure of customer information. As we previously reported, Rockyou was hacked and disclosed it looks like over 32,000,000 accounts. Yes, 32 Million!

Comments  (1)


« First < Previous | 471 - 472 - 473 - 474 - 475 | Next > Last »