Information about general information security issues.

9 Steps to Cybersecurity – Free eBook

/
9 Steps to Cybersecurity - Free eBook

3 Tips to Help Manage Privacy on Facebook

/
3 Tips to Help Manage Privacy on Facebook

Los Angeles Gets ‘Cyber Intrusion Command Center’

/
Los Angeles Gets 'Cyber Intrusion Command Center'

Nessus HTML5 UI 2.0 is Now Available

/
Tenable is pleased to announce the Nessus® HTML5 User Interface (UI) 2.0. The new UI provides policy creation wizards to quickly configure accurate and complete scans, and introduces usability improvements that make scan scheduling, processing, and analysis easy and efficient. The new UI is available when Nessus, Nessus Perimeter Service™, and Nessus Home users log into their scanners.

No password is safe from new breed of cracking software

/
No password is safe from new breed of cracking software

Hackers target President Obama’s social media tools

/
The political activist hackers of the Syrian Electronic Army are at it again, targeting one of the highest-profile users of social media in the world: President Obama. But SEA's claims of commandeering his Twitter account aren't quite accurate

Tor trouble: Anonymizing service faces vulnerability claims

/
Tor trouble: Anonymizing service faces vulnerability claims

Digital Attack Map

/
Check out the Digital Attack Map. It was produced in a collaborative effort by Google Ideas and Arbor Networks to raise awareness about distributed denial of service attacks.

Google’s new service will show Animated map of DDoS attacks

/
Google’s new service will show Animated map of DDoS attacks

Kali Linux Default Username and Password

/
During installation, Kali Linux allows users to configure a password for the root user. However, should you decide to boot the live image instead, the i386, amd64, VMWare and ARM images are configured with the default root password – “toor“, without the quotes.