National Town Hall on Cybersecurity

Join 1105 Media, Cisco, (ISC)² and government and education cybersecurity leaders from across the country for an interactive National Town Hall discussion online.

This event will be held on May 24, 2011 at 1PM EDT.

In this 90 minute TeleWebcast you will hear from:

  • Robert Brammer
    Vice President, Advanced Technology and CTO, Northrop Grumman Information Systems
  • Alan Carswell
    Chair, Cybersecurity and Information Assurance Department, University of Maryland University College Graduate School of Management and Technology
  • Michael T. Dent
    Chief Information Security Officer, Fairfax County
    Government, DIT
  • Michael Kaiser
    Executive Director, National Cyber Security Alliance
  • Donald R. Proctor
    Senior Vice President, Office of the Chairman and CEO Cisco Systems
  • Ron Ross
    Senior Computer Scientist and Information Security Researcher, National Institute of Standards and Technology, Department of Commerce
  • Hord Tipton
    Executive Director, (ISC)²
  • Richard Wistocki
    High Tech Crimes Unit, Naperville, Illinois Police Department

These cybersecurity experts will address specific concerns relative to mobility, and remote access as well as the broader implications of threats.

Registration is Free. but Space is Limited


Register Today

 

Visit the Website for More Information

“Osama Bin Laden Dead” Computer Security Tips: Black-Hat Search Engine Optimization (BH-SEO)

On Sunday evening, May 1, 2011, President Obama stated, “a small team of Americans raided the compound.  After a firefight, they killed Bin Laden.”  The information spread across the Internet at an exponential rate.  Twitter reported more than 4,000 tweets per second at the beginning and end of Obama’s speech, and with no surprise, Google’s top-trending search term is, “Osama Bin Laden Dead”.

As cities, military installations and US Embassies are increasing security measures at the wake of the announcement, so should organizations and individual computer users.

After every major news event in recent years, such as the “Haiti Earthquake”,  “Japanese tsunami”, “William and Kate Wedding” and now, “Osama Bin Laden dead” an increase of fraudulent web sites, links and files offering to provide information and unseen video, pictures come to a rise via emails and social networking sites.

This technique is called Black-Hat Search Engine Optimization (BH-SEO). Black Hat search engine optimization is customarily defined as techniques that are used to get higher search rankings in an unethical manner (Boswell, 2011).  For example, a cyber-crook can increase their search-ranking by feeding them fake pages to make their malicious content seem legitimate, thus tricking users to visiting their malicious site that may be hosting malicious content to infect computers with malware.  The newer the event or content, the more susceptible it is to the BH-SEO techniques, while older content are less susceptible.

What can you do to keep safe?

  • As always, make sure you have an anti-virus/malware application installed and updated on your computer.
  • Try to reside on reputable sources to view content.
  • Do not blindly trust search results; examine the title and content before actually accessing the website.
  • If you get redirected to an unexpected site or obtain a “click here for a free security scan” page, or to take a survey page, or even to a “download this codec program to view the video” DO NOT do it and exit the site.

 

References

Boswell, W. (2011). Black Hat Search Engine Optimization: What is Black Hat SEO? Retrieved from: http://websearch.about.com/od/seononos/a/spamseo.htm

 

FREE On-Line CEH by Shon Harris

Through LinkedIn, Shon Harris is providing FREE On-Line CEH Course with Over 25 Hours Long of information.
The video modules are outlined below and can be found at her website at: www.logicalsecurity.com/resources/resources_videos.html

1. Ethical Hacking and Penetration Testing
2. Footprinting and Reconnaissance
3. TCP/IP Basics and Scanning
4. Enumeration and Verification
5. Hacking and Defending Wireless/Modems
6. Hacking and Defending Web Servers
7. Hacking and Defending Web Applications
8. Sniffers and Session Hijacking
9. Hacking and Defending Windows Systems
10. Hacking and Defending Unix Systems
11. Rootkits, Backdoors, Trojans and Tunnels
12. Denial of Service and Botnets
13. Automated Penetration Testing Tools
14. Intrusion Detection Systems
15. Firewalls
16. Honeypots and Honeynets
17. Ethics and Legal Issues

All videos can be viewed at: www.logicalsecurity.com/resources/resources_videos.html

Hope you find them useful!

Join UMUC for an Evening in Cyberspace, a Black-Tie Gala, April 2, 2011

Please join UMUC for a special evening of dining and entertainment to help support the next generation of cyber-warriors.
An Evening in Cyberspace: Supporting Tomorrow’s Cybersecurity Leaders
Saturday, April 2, 2011 at 7 p.m.
The Gaylord National Resort and Convention Center
201 Waterfront Street
National Harbor, Maryland

Proceeds from this black-tie event will help fund scholarships for students enrolled in the university’s cybersecurity programs.  The event will feature a keynote by General Michael V. Hayden (USAF, Retired), principal of The Chertoff Group and former director of the Central Intelligence Agency and National Security Agency.
Visit www.umuc.edu/cybersecuritygala to register.  For more information, please e-mail events@umuc.edu.

Post Formats is a theme feature introduced with Version 3.1. Post Formats can be used by a theme to customize its presentation of a post.

Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus – more on WordPress.org: Post Formats

Hackers breach security giant RSA’s network

An interesting article by Silicon Republic about the recent RSA breach.

EMC’s security division RSA has revealed its own network has been breached by hackers who launched an ‘extremely sophisticated’ attack that may have compromised the company’s SecureID authentication service.

In a note to customers, executive chairman Art Coviello said the company had identified a sophisticated cyber attack in the form of an advanced persistent threat (APT).

Full story can be access from Silicon Republic here