Information about general information security issues.

Comparing enterprise data anonymization techniques

/
There comes a time when data needs to be shared -- whether to evaluate a matter for research purposes, to test the functionality of a new application, or for an infinite number of other business purposes. To protect sensitivity or confidentiality of shared data, it often needs to be sanitized before it can be distributed and analyzed.

Metasploit Tutorial – Simple Icecast Exploit

/
This module exploits a buffer overflow in the header parsing of icecast, discovered by Luigi Auriemma. Sending 32 HTTP headers will cause a write one past the end of a pointer array. On win32 this happens to overwrite the saved instruction pointer, and on linux (depending on compiler, etc) this seems to generally overwrite nothing crucial (read not exploitable).

Cyber Espionage: The Chinese Threat (Full Episode) CNBC

/
It’s what experts at the highest levels of government say is the biggest threat to America’s economic security. Cyber spies hacking into U.S. corporations’ computer networks are stealing valuable trade secrets, intellectual property data and confidential business strategies.

‘Internet doomsday’ impact minimal, service providers say

/
Hours after "Internet doomsday" kicked in, major service providers say almost all customers have avoided the shut-off of their Internet service, although there are some who will not be able to read this story online, unless it's on their smartphones.

Cyber Espionage: The Chinese Threat

/
Experts at the highest levels of government say it's the biggest…

Understanding and Protecting Personally Identifiable Information (PII)

/
What is Pii? It is Personally Identifiable Information (PII), a term used in information technology sector to describe information about an individual that could potentially identify that person, such as a name, email address, street address, telephone number or social security number or other biometric data, number.

Confidentiality Integrity Availability (CIA) Triad

/
The principal of information security is to protect the confidentiality, integrity and availability of information from harm. These principals together are known as the CIA Triad.

SummerCon 2012 Wrap Up

/
This past weekend in downtown Brooklyn New York, a few miles away from the new Nets stadium was SummerCon 2012. SummerCon has the title of being the longest-running American hacker conference where information security professional gets to mingle with hackers, security researchers, law enforcement officials and students thanks to Facebook.

How to Protect Your WordPress wp-config.php File and Your .htaccess File

/
The wp-config.php file contains all the confidential details of your site. So it’s pretty important that you protect it at all costs. An easy way to protect this file is to simply place the following code in your .htaccess file on your server.