Morto Computer Worm Infecting Computers via Remote Desktop Protocol (RDP)

/
A new worm called Morto has begun making the rounds on the Internet in the last couple of days, infecting machines via RDP (Remote Desktop Protocol). The worm is generating a large amount of outbound RDP traffic on networks that have infected machines, and Morto is capable of compromising both servers and workstations running Windows. If you have any questions or need assistance, please let me know and I will follow up with you. Additional Information: • http://threatpost.com/en_us/blogs/new-worm-morto-using-rdp-infect-windows-pcs-082811 • http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Worm%3aWin32%2fMorto.A • http://blogs.computerworld.com/18870/morto_worm_spreading_fast_via_rdp?af

Security Conference “DerbyCon” Makes a Splash in the Information Security Field with a Huge Speaker Lineup. A New Hackercon is Born

/
DerbyCon is a new hacker conference in the heart of Louisville, Kentucky's 4th Street Live. DerbyCon isn’t just another security conference, we’ve taken the best elements from all of the conferences we’ve ever been to and put them into one. This conference is a place you can call home, where you can meet each other or new people, party, and learn.

1105 MEDIA ANNOUNCES KEYNOTES FOR INAUGURAL 2011

/
1105 Government Information Group, the leading provider of integrated information and media for the government information technology (IT) market, today announced new keynote presenters for its 2011 Geospatial Summit. The event will be held September 13, 2011 at the Hyatt Dulles in Herndon, Virginia. The opening keynote address, GIS to the Rescue: The Critical Role of Geospatial Technology in Disaster Response will provide an account of a real-world emergency response from veteran disaster relief expert Michael Byrne, Leader -National Incident Management Assistance Team - Blue (N-IMAT Blue), Federal Emergency Management Agency (FEMA), as well as the technical expertise of Russ Johnson, Director - Public Safety and Homeland Security, Esri.

U.N. Cybersecurity Arm Endorses EC-Council’s Global CyberLympics

/
Aug 4, 2011 | ALBUQUERQUE, NM - The cybersecurity executing arm of the United Nations has endorsed the Global CyberLympics, a new initiative by the EC-Council to foster stronger international cooperation on information security issues and to improve cybersecurity training and awareness in developing nations and third world countries.

TECHNICAL SECURITY CONFERENCE (FREE FOR GOVT) : GET Continuing Education Credits

/
EC-Council is bringing some technical training classes to DC which culminates with a one-day highly technical security seminar on Aug 25 and it is free for all Government employees!..... and subsidized for the rest to just $99 ! Unlike other conferences, participants will not be rushed through the presentations, and they can actually learn about the specific topics that are being presented. Renowned security and cyber warfare experts - Jeff Bardin and Richard Stiennon, will be the keynotes for this seminar. The pricing of the event is kept very low to ensure that budget cuts do not affect the community.

NSA Trusted Computing Early Bird Rate Runs Out Friday!

/
To ensure the reduced early bird registration rate, be sure to sign up for the 2nd Annual NSA Trusted Computing Conference & Exposition by Friday, 12 August! Join hosts, the National Security Agency, on 20 - 22 September in Orlando, FL, to explore the conference theme, "Using COTS Technologies to Deliver Decisive Defensive Advantage." The National Security Agency is pleased to announce the addition of three new exceptional speakers to the agenda:

Enterprise Log Management: An Overview (Part 2) – – FOSE

/
In part 1 of my guest post series for the FOSE Insights Blog,…

Enterprise Log Management: An Overview (Part 1) – – FOSE

/
Log management is the collection of self-generated data from IT hardware devices and software applications. The collection of this data can contain useful information about business processes such as the number of errors on a website or even a security issue that displays the number of failed attempts to access a perimeter router.

Watch Live: Sub-Oversight Committee Hearing at 11AM ET on Cybersecurity

/
Watch Live: Sub-Oversight Committee Hearing at 11AM ET on Cybersecurity

SECURITY 660: Advanced Penetration Testing, Exploits, and Ethical Hacking

/
As a perpetual student of information security, I am excited to offer this course on advanced penetration testing. Often, when conducting an in-depth penetration test, we are faced with situations that require unique or complex solutions to successfully pull off an attack, mimicking the activities of increasingly sophisticated real-world attackers.