Spammers Stay Busy Despite Pushdo Botnet Hit

/
From the shutdown of McColo to last week's disruption of the Pushdo botnet, spammers have continually found ways to stay in business. Nearly 20 of the 30 command and control (CnC)servers associated with Pushdo were taken offline last week due to efforts by security vendor LastLine. The servers were supported by eight hosting providers, some of which did not respond to the vendor's requests for action.

New Fake TweetDeck Update – Beware of Spreading Malware

/
Many TweetDeck users have awaken to an unfortunate surprise this morning when trying to launch the application. What is the unfortunate surprise you ask? “It did not work!” Twitter has recently implemented major changes to how other applications access your Twitter account and hackers have taken the opportunity by implementing a malware since they know millions of Twitter users will be looking for the new updates. The fake Tweetdeck update that is actually a Trojan virus. A Trojan virus is malware that appears to perform a desirable function for the user but instead facilitates unauthorized access of the user's computer system.

Security Job Posting – Urgent Position -90k Network Security Specialist position in Alexandria VA

/
Our Client has an immediate need for a Network Security Specialist to support a true (24x7x365) NOC in Alexandria,VA for the USPTO (US Patent Trade Office) on the EUS contract. This is a perm requirement.

Internet Safety: Content Filtering Software for Kids

/
Parents do not allow their kids access to adult content while reading a magazine or watching TV, so the same should be taken into consideration when it comes to using the computer and mobile phone. Yes, mobile phones too. Ideally, parents would like to shoulder surf while their kids are on the Internet, but the reality is that’s not always possible. Teaching kids to use the Internet properly and not to disclose personal information as describe in a recent article is a very important step in keeping them safe, but adding a bit of insurance with an Internet content filtering software geared towards protecting kids can also compliment a potential dangerous situation.

Apple Mac Security Update Plugs 13 Vulnerabilities

/
Apple released a security update for Mac OS X that patches 13 vulnerabilities. The release fixes issues in several components, including CoreGraphics and Apple Type Services. Several of the vulnerabilities are buffer overflows, and can be exploited to execute arbitrary code.

Recorded Wireshark Certification Webinar Available Now

/
The Wireshark Certified Network Analyst webinar recording is available at www.wiresharktraining.com/certification. The Exam Information Pack is available at the same location.

Child Safety on the Internet

/
The Internet has made it possible for people to communicate with anyone anywhere in the world. That is a scary thought when it comes to thinking about child safety on the Internet. On a daily basis, kids are on line communicating on chat rooms without adult supervision not really knowing the person on the end is who they claim to be.

FISMA NextGen – Continuous Monitoring, Near Real-Time Risk Management

/
Ran across this interesting presentation on FISMA and Continuos Monitoring...

ISACA’s Certified Information Security Manager (CISM) Certification Early Exam Registration Deadline

/
Certified Information Security Manager (CISM) The management-focused CISM is a unique certification for individuals who design, build and manage enterprise information security programs. CISM is the leading credential for information security managers.. The CISM certification promotes international practices and individuals earning the CISM become part of an elite peer network, attaining a one-of-a-kind credential.

Linux Security, Then and Now

/
Linux is inherently not a secure operating system. The reason it's not secure is because Linux was based on the architectural design of UNIX, and the creators of UNIX didn't care about security – it was 1969 after all. "The first fact to face is that UNIX was not developed with security, in any realistic sense, in mind; this fact alone guarantees a vast number of holes," Dennis Ritchie wrote in his paper, "On the Security of UNIX" in 1979.