Entries by SecurityOrb_Staff

Information Security Definitions – Zero Day Attack (0 Zero Attack)

A zero-day attack or threat is a computer threat that tries to exploit unknown, undisclosed or unpatched computer application vulnerabilities. The term Zero Day is also used to describe unknown or Zero day viruses.

Zero-day exploits are released before the vendor patch is released to the public. Zero-day exploits generally circulate through the ranks of attackers until finally being released on public forums. The term derives from the age of the exploit. A zero-day exploit is usually unknown to the public and to the product vendor.

SC Magazine Strengthens Commitment to Canadian Information Security with Inaugural SC Congress Canada

TORONTO – June 3, 2010: Today, SC Magazine announced the SC Congress Canada, the newest venue for information security industry leaders to convene and discuss lessons learned and best practices to help organizations address the burgeoning landscape of security threats and regulatory mandates. Public registration will soon open for the SC Congress Canada taking place in Toronto on November 16-17, 2010.

ISACA’s Certified Information Security Manager (CISM) Certification Early Exam Registration Deadline

Certified Information Security Manager (CISM)

The management-focused CISM is a unique certification for individuals who design, build and manage enterprise information security programs. CISM is the leading credential for information security managers..

The CISM certification promotes international practices and individuals earning the CISM become part of an elite peer network, attaining a one-of-a-kind credential.

Linux Security, Then and Now

Linux is inherently not a secure operating system. The reason it’s not secure is because Linux was based on the architectural design of UNIX, and the creators of UNIX didn’t care about security – it was 1969 after all.

“The first fact to face is that UNIX was not developed with security, in any realistic sense, in mind; this fact alone guarantees a vast number of holes,” Dennis Ritchie wrote in his paper, “On the Security of UNIX” in 1979.