Phishing Overview in the United States

/
In United States, phishing is becoming one of the fastest evolving classes of identity theft scams on the Internet, causing both short-term losses and long-term economic damage. In a phishing scam, the identity thief poses as a legitimate person from a reputable company to try to entice people to visit bogus Web sites, where they are asked to reveal important personal information, such as credit card data. Although most phishing attacks target the financial industry, a growing number of phishing incidents target other sectors, such as retailers, online game operators and Internet Service Providers.

CWSP – Certified Wireless Security Professional

/
The CWSP exam is an advanced level wireless LAN certification developed by Planet3 Wireless. This exam is a part of the Certified Wireless Network Program (CWNP). The exam tests your ability on how well you are able to protect your company’s valuable data from hackers. For anyone desiring a career in IT or Security this is a certification you cannot afford to be without.

Why Bots are Bad News to your Network…

/
Any security vulnerability is potentially damaging to a business, and bots are no different. When malware programs are running on employee machines, companies have the right to worry about the safety and integrity of their data and their systems, and whether compromised information and performance could affect not just their competitiveness but their viability. Adhering to company policies such as remote access, software downloads and patch management are all key to protecting the enterprise.

Information Security Definitions – Zero Day Attack (0 Zero Attack)

/
A zero-day attack or threat is a computer threat that tries to exploit unknown, undisclosed or unpatched computer application vulnerabilities. The term Zero Day is also used to describe unknown or Zero day viruses. Zero-day exploits are released before the vendor patch is released to the public. Zero-day exploits generally circulate through the ranks of attackers until finally being released on public forums. The term derives from the age of the exploit. A zero-day exploit is usually unknown to the public and to the product vendor.

CBT Nuggets Review of the Certified Ethical Hacker (CEH) Course

/
CBT Nuggets site is a good resource for online video training. There were a few minor issues that come with age, such as the site intermemos.com no longer being available, but away from that, the content and presentation of the material was really good and easy to follow. The training package went into a lot of detail and in some cases going over the really basic information that most candidates for the CEH should already have a full grasp on, at least in my opinion. The prices are fair and consistent with other training sites, the one thing I would point out is if you get the 30 day license, you really make sure you have the time during that month to complete the training; there are approximately 11 and ½ hours of material in this course.

Enabling DVD playback in Ubuntu 9.04

/
I have just finished installing Ubuntu 9.04 on a Gateway laptop, everything worked well from video to wireless until I popped in a DVD to watch. Did the updates and still nothing, until I ran across this command on the Internet, tried it and everything is golden now.

SC Magazine Strengthens Commitment to Canadian Information Security with Inaugural SC Congress Canada

/
TORONTO - June 3, 2010: Today, SC Magazine announced the SC Congress Canada, the newest venue for information security industry leaders to convene and discuss lessons learned and best practices to help organizations address the burgeoning landscape of security threats and regulatory mandates. Public registration will soon open for the SC Congress Canada taking place in Toronto on November 16-17, 2010.

Webcams and your Privacy…

/
Cybercrime expert Gregory Evans explains the potential risks hackers can pose to webcams on your system and how to ensure your safety and privacy online. This issue is a problem as in the case against a Pennsylvania school district that turned on the webcam of various student's school-issued laptops while the computers and captured images of "inappropriate activity" in the student's home.

October is National Cybersecurity Awareness Month

/
The National Cybersecurity Awareness Month officially kicked off today Monday, October 4, 2010 in Washington DC at The Lockheed Martin’s Global Vision Center (GVC). The campaign for this year is titled, "Stop. Think. Connect." This aims to empower citizens to make choices that contribute to the overall security of the Internet; according to a White House proclamation issued last Friday.

MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam

/
MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam will prepare you to pass the CISSP® Certification Exam. This course is an accelerated review course that focuses solely on the ten domains of knowledge as determined by ISC2. Test-taking tips and strategies are also discussed.