CNN Interview with Kevin Mitnick (Former Hacker)

/
I ran across an interesting CNN interview with Kevin Mitnick (Former Hacker) as the guess. In the interview, he discussed the importance of having a personal firewall, being aware when using public wireless access points. He later recommended the use of VPNs when using public wireless access, using a more secure browser such as Google’s Chorme as well as using the “FREE” tool known as “Personal Software Inspector” to let you know if your software is out of date.

FREE On-Line CEH by Shon Harris

/
Through LinkedIn, Shon Harris is providing FREE On-Line CEH Course with Over 25 Hours Long of information. The video modules are outlined below and can be found at her website at: www.logicalsecurity.com/resources/resources_videos.html

Cyber-Bullying Overview and Information

/
Cyber-bullying uses the new forms of digital communication technologies to repeatedly harass others. A cyber-bully is someone who uses technology to harass, embarrass, intimidate, or stalk someone else. The methods used can include emails, instant messaging, text-messages, digital photos and all other means of electronic communications.

Database Security with Application Security, Inc.

/
The critical first step in any IT audit is to identify all assets and applications residing on the network... AppDetectivePro’s Database Discovery module provides complete visibility into the inventory of databases on any network. Simply connect a laptop running AppDetectivePro to the network, and without agents, database logins, or other knowledge, the solution will scan and identify every database by vendor and release level.

An Interview with The Chairman and Founder of SINET, Robert D. Rodriguez

/
The SINET is designed to create a demand pull environment through education, collaboration, access, knowledge transfer, technology transition and policy that leads to rapid identification, assessment, evaluation and integration of "best of class" IT security solutions.

The FireEye Malware Protection System (MPS)

/
The FireEye Malware Protection System (MPS) accurately blocks Modern Malware, such as Trojans, bots, crimeware, and advanced persistent threats, in real-time using an advanced multi-phase analysis engine to capture and confirm zero-day malware and targeted attacks. At the core of each security appliance are the FireEye Malware-VM™ and Malware-Callback™ technologies, which combines inbound and outbound filtering to break the malware infection lifecycle.

Trustifier Security Product

/
Starting from the operating system kernel itself, Trustifier security engine can inject itself into all core security layers within an operating system and into applications, where it performs checks on the operations of the applications, system services, user behaviour, device control, network usage, data processing, and more.

Invincea™ Browser Protection enables users to knock out sophisticated Web-borne threats–in real time

/
Invincea™ Browser Protection shields PC users against all types of Web-borne threats by seamlessly moving desktop Web browsers into a controlled virtual environment.

BackTrack 4 Tutorials, Manuals and Howtos

/
I have gather a few resources from various locations on BackTrack 4. Used it for an audit recently and it worked great... The manuals section provides you with simple information in order to get up and running with Back|Track and help with some additional features unique to the suite.

Webcams and your Privacy…

/
Cybercrime expert Gregory Evans explains the potential risks hackers can pose to webcams on your system and how to ensure your safety and privacy online. This issue is a problem as in the case against a Pennsylvania school district that turned on the webcam of various student's school-issued laptops while the computers and captured images of "inappropriate activity" in the student's home.