White House to Unveil Cyber Security Proposal
/
0 Comments
White House officials Thursday planned to unveil a major legislative proposal aimed at improving U.S. cybersecurity and protecting the economy, an administration official said.
Patch Management Survey
A Doctoral Student in Information Assurance is conducting a survey with the goal of understanding the collective IT perception of patch management along with any associated misconceptions relative to how vendors actually handle patch releases/cycles.
Feb Edition of Hackin9 – Network Security
Another exciting edition of Hackin9 is out and you can download it here. Information about this edition is located below:
· Wuala – Secure Online Storage
There are a lot of online storage/backup solutions available nowadays and it is hard to find differences between them, but I think Wuala from LACIE may have something unique in the way their solution works.
Introducing SAINT for MAC OS X
Vulnerability Scanning -
Assess any target with an IPv4, IPv6, or URL with pre-defined policies for PCI, HIPAA, FISMA, and more. Identify CVE, OSVDB, IAVA, OVAL, and more.
Penetration Testing -
Exploit vulnerabilities to gain remote access. Run social engineering, phishing assessments, and more with the exploit tools suite.
Understanding What Threat Lies Beneath!
The average citizen is very lax with the security of their credit card information therefore may be giving a non-verbal invitations to credit card scammers. Understanding how your card can be compromised is the first step to protecting your credit. There are many ways to extract your sensitive data to enable someone to go on a “free” shopping spree.
How good is a product, when the support for it SUCKS?
Something I see get overlooked often in reviewing products, especially expensive security products, is support. I've done hundreds of product reviews over the years and numerous benchmarking comparisons to find the best software/hardware for the job. Early on I took for granted the type of support and the ease of access to qualified technical support staff, now it is my 2nd priority when investigating any product.
SecurityOrb’s Top 5 Cyber Security Threat Predictions for 2011
2010 was an attention-grabbing year in the information security industry. We saw some interesting things such as Google alleged hack by China, Wiki leaks and the issues with insider threat and hacktivism, Stuxnet advanced malware implementation and social networking site vulnerabilities as well as our share of zero-day attacks to name a few. So, what is in store for 2011 you ask?
Hacker Group “Anonymous”, has Declared Cyber-War on behalf of WikiLeaks
A hacker group, identified as “Anonymous”, has declared cyber-war on behalf of WikiLeaks and the attempt to censor the organization’s activities by the U.S. government and private companies. They are responsible for the recent distributed denial-of-service (DDoS) attacks on PayPal, Visa and MasterCard which has been titled “Operation Payback”.
Browser History Hijacking Flaw
Browser history hijacking is a flaw in a web browser that allows certain websites access to all the sites a user has ever visited. This is a techniques used by sporting, news, movie, financial and porn websites to better place ads and check to see if you have visited any of their competitors.
The WikiLeaks Security Issue – The Un-Political Side
The political aspect is obvious to many of us, but the information assurance side reveals a scary situation. If the government, with all of its resources is having difficulties protecting sensitive documents, what chances do private companies have?
