SummerCon 2012 Day 1 – Friday, June 8
SummerCon 2012 a hacker’s conference being conducted in beautiful downtown Brooklyn started today June 8th. Doors opened at noon, with opening remarks from organizer redpantz and Mark Trumpbour.
This author has not written his bio yet.
But we are proud to say that admin contributed 269 entries already.
SummerCon 2012 a hacker’s conference being conducted in beautiful downtown Brooklyn started today June 8th. Doors opened at noon, with opening remarks from organizer redpantz and Mark Trumpbour.
Malware Installed on Travelers’ Laptops Through Software Updates on Hotel Internet Connections – Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while establishing an Internet connection in their hotel rooms.
The Counter Terror Expo US is coming to Washington, DC on May 16 and 17 to the Washington Convention Center. I had the esteemed opportunity to interview Wayne Crawford, Vice President of North America, Clarion Events for Counter Terror Expo US and Amb. David J. Smith, Senior Fellow & Cyber Center Director at the Potomac Institute for Policy Studies during my weekly BlogTalkRadio show. Mr. Crawford provided a wealth of information about the upcoming event while Amb. Smith gave some insight about the topic he will be discussing at the Expo.
SANSFIRE 2012 will take place at our Hilton Washington and Towers campus, July 6-15. There will be more than 40 SANS IT Security Training courses available. This training event is powered by the (ISC) Internet Storm Center and is an opportunity to meet the ISC handlers.
According to a survey by InfoSecurity magazine that stated IT professionals’ average salaries overall decreased by 5.5%, while those in IT security increased by 3.1% show that experience in security is a valuable skill.
Furthermore, The US Department of Defense (DoD) Directive 8570.1-M requires every part-time or full-time military member or defense contractor that has access to a privileged DoD system to be held by trained and CERTIFIED personnel in a commercial certification to enhance Information Assurance (IA) of the US Department of Defense’s (DoD) information, information systems, and networks.
Security assessments can fall into many categories and an organization’s core competency often dictates which ones management is more interested in conducting. For example, an organization that has an external presence may be very interested in how they appear to the outside world and how well they are protecting their internal resources from external entities trying to harm them. Whereas, another governmental institution maybe more concerned with their internal security posture and controls as compared to how they appear to the outside world. They may have a pressing need to verify internal access control, password compliance and proper network segmentation as opposed to what protocols are accessible from the public network. The actual type of assessment performed usually depends on the organization’s mission as well as their overall security need.
On March 14, 2012, Microsoft released a critical software patch that fixes a very high-risk vulnerability in the RDP (Remote Desktop) service installed on most Windows-based systems. The vulnerability may allow the execution of malicious code by sending a malformed packet to an RDP enabled system.
Security Bulletin: MS12-020
Just last week we told you about a string of arrests in several South American countries, all of which were tied to hacktivist group, Anonymous. This week it looks like the feds are taking on LulzSec and it’s now know that the founder reportedly worked with the Feds. The informant in question might sound […]
As of March 1, 2012, Google officially combined privacy policies from more than 60 of its services to a single privacy policy. In doing so, Google is now able to take information from users who are logged-in to its products and services and store them into a database.
Federal agencies, due to Federal Information Security Management Act (FISMA) requirements, are obligated to assess the effectiveness of their systems, as well as the security controls that are in place as part of the certification and accreditation (C&A) process before operations can be approved.
Bellow are some interesting links for you! Enjoy your stay :)
Our support Hotline is available 24 Hours a day: (240) 880-8947
