Is the US government helping cyber crooks?

As the U.S. government defends our interests and technology in the escalating global cyberwar, could it inadvertently be handing cyberweapons to criminals?

Last week, security firm Kaspersky hinted that such a nightmare situation may have taken one step closer to reality. Kaspersky revealed that a sophisticated program had been used to record instant messaging and social networking logins and bank account information and passwords — including targets such as Citibank and PayPal accounts — on some 2,500 infected PCs.

Read More >>

Hackers leak 1 million Apple device IDs

To cap off a summer of devastating corporate data breaches, hackers yesterday posted online what might be the crown jewel of 2012 data dumps: 1 million identification numbers for Apple iPhones, iPads and iPod Touch’s, all purportedly stolen from the FBI.

There may also be an additional 11 million Apple device IDs yet to be released, many with users’ full names, addresses and telephone numbers attached.

Read More >>

Vulnerabiltiy Management in the Cloud

Vulnerabiltiy Management in the Cloud Andrew Wild, Chief Security Officer at Qualys

Live September 6, 2012 10 AM EDT and afterward on demand

Vulnerability management is a key component of a strong information security program. And that’s making sure that with everything you’re doing – in the cloud, on the desktop, browsers and server environments – you can reduce the vulnerabilities so that no matter what threats are out there, they are less likely to be successful.

While vulnerability management is well understood, virtualization and cloud computing bring about sweeping changes to many areas including vulnerability management. Join Andrew Wild, Chief Security Officer at Qualys as he will provide insight and solutions for effective vulnerability management in the cloud. Make sure to bring all your questions!

register

Review the full summit line-up and register to attend
Engage with the speakers during the presentations submitting real-time questions and voting in audience polls. If you are unable to attend the webinars live, you can watch afterwards on-demand. Join the conversation on Twitter: #InfoSecSummit

EC-Council Certified Members attending Security Channel webcasts will earn 1 ECE credit.

Website “WeKnowYourHouse.com” Threats Your Privacy and Safety

 

A new website known as WeKnowYourHouse.com combinations tweets by users who write about being home and sifts through those posts to find ones that also include the users’ location data. Having those two pieces of information, which are publicly available, the site also incorporates Google Streetview to post an image of the person’s home.

An already established website “PleaseRobMe.com” uses a similar technique, but to do the opposite by letting people know when you are not at home, such as vacationing or at an event.

This is a reminder, as entertaining and engaging social networking can be, there are dangers and it should be used as responsibly as possible.

If you do not want anyone to find out where you live on WeKnowYourHouse.com or any other social media platform turning off your location data is the best bet.

EC-Council TakeDownCon Online

Online TakeDownCon

Live August 15 and afterward on demand

Highlighted Presentations:


Bring Your Own Destruction
Aamir Lakhani, Senior Solutions Technical Global Architect, World Wide Technology

August 21, 2012 9:00 am PT, 12:00 pm ET

BYOD is the word of the day.  Everyone is jumping at the chance to buy a solution that solves the BYOD issues.  however, enabling BYOD for an organization is much more than picking a single vendor solution.  It is about understanding mobile risks and building a mobile secure ecosystem.  This talk will examine how to build a complete BYOD solution taking into account multiple attack vectors and ways to solve the issue.


Live Interactive Survey – Are You Prepared for Next Generation Threats?
Jason Olsen, Information Security & GRC Team Lead, BrightTALK; Daniil Karp, Information Security and GRC Marketing Programs, BrightTALK

August 15, 2012 10:00 am PT, 1:00 pm ET

Next generation threats can impact security investment and the vendors that we work with to protect our organizations.  now more than ever it is important to understand how our peers are investing their security dollars and what the business drivers are.  Join this brief interactive survey to be the first to see the results of the 2012 BrightTALK Threat Protection purchase intentions survey.


Antivirus Software: Understand Detection Methods Before You Buy
Brandon Stigers, Director and Stephen Cobb, Security Evangelist, ESET

August 15, 2012 10:00 am PT, 1:00 pm ET

 

Before you choose an antivirus solution, it’s important to understand how it goes about detecting malware in the first place.  Join us as we discuss:

  • Security in the news
  • Modern threat categories and attack vectors
  • Endpoint risks, infection methods, payloads
  • Detection with signatures and heuristics
  • Zero Day Risk
  • Technologies that protect removable storage devices
  • Best Practices

 

 


EC-Council Certified Members attending Security Channel webcasts will earn 1 ECE credit.
Subscribe to Channel RSS Feed to stay updated on the newest webcasts being scheduled!