
Security System Development Life Cycle (SecSDLC)
/
2 Comments
The Security System Development Life Cycle (SecSDLC) follows the same methodology as the more commonly known System Development Life Cycle (SDLC), but they do differ in the specific of the activities performed in each phase.uno_appinventor_lesson01_activity1_image2

[Infographic] Wiretapping: Privacy vs. security
Here is a timely trip through the U.S. history of the privacy vs. security debate as it relates to wiretapping, courtesy of whocalledmyphone.net. The infographic below follows a path from the establishment of the 4th Amendment in 1791 to Edward Snowden, the NSA.

WordPress Most Popular Security Plugins (Infographic)
Though there are large numbers of these security plugins but the details of the most popular ones are given in the following part of the article

Apple new piece of technology will allow Govt. to switch off iPhone video, camera and wi-fi anywhere
Apple new piece of technology will allow Govt. to switch off iPhone video, camera and wi-fi anywhere

China’s Internet hit by biggest cyberattack in its history
Were you trying to access a .cn Internet address over the weekend? Are you still hitting refresh?
Internet users in China were met with sluggish response times early Sunday as the country's domain extension came under a "denial of service" attack.

US science fund pumps $20 million into cybersecurity research
US science fund pumps $20 million into cybersecurity research

Snowden suspected of bypassing electronic logs
The U.S. government's efforts to determine which highly classified materials leaker Edward Snowden took from the National Security Agency have been frustrated by Snowden's sophisticated efforts to cover his digital trail by deleting or bypassing electronic logs, government officials told The Associated Press. Such logs would have showed what information Snowden viewed or downloaded.

$6B DHS Cybersecurity Contract Sets Off Race to Supply Real-Time Monitoring to Feds
$6B DHS Cybersecurity Contract Sets Off Race to Supply Real-Time Monitoring to Feds

NSA has access to 75 percent of US Internet traffic, says WSJ
The National Security Agency's surveillance network has the capacity to reach around 75 percent of all U.S. Internet communications in the hunt for foreign intelligence, the Wall Street Journal reported on Tuesday.

How To Install Armitage on Kali Linux
I noticed almost immediately, Armitage a GUI front-end for the Metasploit Framework developed by Raphael Mudge was not preinstalled like in the BackTrack version.