New Stuxnet clues suggest sabotage of Iran’s uranium enrichment program
/
0 Comments
Stuxnet, considered by many security researchers to be the most sophisticated malware ever, targeted Windows PCs that managed large-scale industrial-control systems in manufacturing and utility companies. Those control systems, called SCADA, for "supervisory control and data acquisition," operate everything from power plants and factory machinery to oil pipelines and military installations.
Xbox 360 Kinect controller hacked; use Kinect with a PC
A hacker named Hector Martin is the first person to claim a prize of £1,870 for successfully producing drivers for the Kinect controller. These drivers will be continually updated by a growing community. Hector’s drivers are for Linux systems at the moment.
Be Prepared for Cyber Monday…
The term “Cyber Monday” refers to the Monday immediately following Black Friday, the ceremonial kick-off of the holiday online shopping season in the United States between Thanksgiving Day and Christmas. Whereas Black Friday is associated with traditional brick-and-mortar stores, "Cyber Monday" symbolizes a busy day for online retailers.
Howard Schmidt, Cybersecurity Coordinator for the White House will be a Keynote Speakers for SC World Congress
We are pleased to announce that we have confirmed Howard Schmidt, cybersecurity coordinator for the White House, as one of the keynote speakers for SC World Congress.
The Security Innovation Network (SINET) 2010 – Increasing Awareness of Innovative Cyber-Security Companies and Products
The Security Innovation Network (SINET) Workshop was held on October 26th and 27th at The National Press Club in Washington, D.C. The workshop was truly a place were security issues of today were being solved with innovative solutions of tomorrow.
The purpose of SINET was to bring innovative cyber-security companies together with government and corporate customers as well as venture capitalist for possible continued funding and product expansion.
BackTrack 4 Tutorials, Manuals and Howtos
I have gather a few resources from various locations on BackTrack 4. Used it for an audit recently and it worked great...
The manuals section provides you with simple information in order to get up and running with Back|Track and help with some additional features unique to the suite.
An A-Z Index of the Bash command line for Linux
An A-Z Index of the Bash command line for Linux.
Metasploit Pro – Now Available – Free Trial & Webcast with HD Moore
Metasploit Pro is designed for security professionals in enterprises, government agencies and consulting firms who need to make network security testing more efficient in order to reduce costs. Unlike alternative products, Metasploit Pro improves the efficiency of penetration testers by providing unrestricted remote network access, and by enabling teams to collaborate efficiently. Metasploit Pro exceeds the functionality of Metasploit Express™ with support for security testing of custom Web applications, managing client-side campaigns against end-users, and additional evasion features. And, effective immediately, Metasploit Pro is available for trial and purchase.
Phishing Overview in the United States
In United States, phishing is becoming one of the fastest evolving classes of identity theft scams on the Internet, causing both short-term losses and long-term economic damage. In a phishing scam, the identity thief poses as a legitimate person from a reputable company to try to entice people to visit bogus Web sites, where they are asked to reveal important personal information, such as credit card data. Although most phishing attacks target the financial industry, a growing number of phishing incidents target other sectors, such as retailers, online game operators and Internet Service Providers.
CWSP – Certified Wireless Security Professional
The CWSP exam is an advanced level wireless LAN certification developed by Planet3 Wireless. This exam is a part of the Certified Wireless Network Program (CWNP). The exam tests your ability on how well you are able to protect your company’s valuable data from hackers. For anyone desiring a career in IT or Security this is a certification you cannot afford to be without.
