Skip to main content

Home/ Groups/ CSIA 459
Amy Harding

http://resources.idgenterprise.com/original/AST-0084883_2013_Threat_Report.pdf - 1 views

  •  
    2013 Threat Report
Amy Harding

Video: Flame: Trying to Unravel the Mystery of Spying Malware | Watch PBS NewsHour Onli... - 4 views

  •  
    "Flame: Trying to Unravel the Mystery of Spying Malware"
  • ...1 more comment...
  •  
    Two things I found very interesting about Flame is the size of the malware as well as the ability to utilize Bluetooth to collect data. Considering Bluetooth usage has increased in some countries and is automatically turned on by default on cell phones, this could enable a lot of information to be collected.
  •  
    We will see more of this type of modification of Stuxnet and Flame. The bad thing about finding stuff like this, is others who could not have made malware as technically advanced as this, will be able to modify it much easier than if they would have had to design it from scratch.
  •  
    focused on the comment made by the analyst on the differentiation of cyber "war" vs. cyber "espionage" as it appears that Flame is more on cuber espionage since it is desgined to collect infor from specific targets.
Amy Harding

Down the Security Rabbithole - 0 views

  •  
    If you like podcasts this is interesting - helping to understand that security does not really exist and instead we are just managing risk.
Amy Harding

How fraudulent blackhat SEO monetizers apply Quality Assurance (QA) to their DIY doorwa... - 0 views

  •  
    Scary when the criminals are fighting each other....
Vickye F

Insider Threat Security Reference Architecture - 1 views

  •  
    Framework for Insider threats
Amy Harding

The 15 worst data security breaches of the 21st Century - CSO Online - Security and Risk - 9 views

  •  
    Interesting read, the Dept. of VA breach is a good reminder about physical security. It seems that quite often we focus so much on the technical that the fundamental is overlooked. It find it interesting that they have Stuxnet on this list. It is my understanding that Stuxnet was not really a data breach but more of a process breach.
Trevor Pyle

Big Data, Trying to Build Better Workers - 2 views

  •  
    Interesting article from the NY Times on how some companies are utilizing big data in the work environment.
James Thomas

Spy vs. Spy: Counter-intelligence methods - 0 views

  •  
    This was an interesting and informative paper about rootkit design and methodologies to help us better understand their capabilities, and it give ways in which one can spy on the attackers.
Robert Scire

'World's fastest' home internet service hits Japan with Sony's help, 2 Gbps down - 1 views

  •  
    Wanted to share even though it is off topic for this week. Definitely something that would be good to have over here in the States - especially at 51 dollars per month.
Brandon Kennedy

Anonymous vs. WBC - 0 views

  •  
    In relation to this week's Anonymous reading. WBC says they are going to protest the Boston victims.
Robert Scire

Anonymous hackers bring down North Korean websites for a second time - Yahoo! News - 0 views

  •  
    Thought this was interesting - especially with all the current events involving North Korea.
Kerry Tam

DHS seeks student hackers - 0 views

  •  
    Here's an interesting article from DHS. They're seeking high school students and college students.
Amy Harding

UMUC Achiever Spring 2013 - 2 views

  •  
    This magazine published by UMUC is all about Cybersecurity. Thought you might enjoy reading it.
Trevor Pyle

Local police grapple with abilities to respond to cybercrimes and cyberthreats - 2 views

  •  
    Article from the Washington Post about law enforcement's struggle to respond to "smaller" cybercrimes.
Phil Kemp

Hacker says phone app could hijack plane - 0 views

  •  
    Interesting article about an app that has been specifically designed to take control of an airplane.
Amy Harding

Stop Fake Antivirus - 2 views

  •  
    This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.
Amy Harding

Ransomware: A growing Menance - 1 views

  •  
    This malware is highly profitable, with as many as 2.9 percent of compromised users paying out.
Amy Harding

Tools of the Trade: Exploit Kits - 1 views

  •  
    Here is a recent article that discusses additional exploit kits besides the Blackhole kit discussed in the video.
Michael Austin

How a Google Headhunter's E-Mail Unraveled a Massive Net Security Hole | Threat Level |... - 0 views

  •  
    A fun read about a former Google vulnerability. Of note is the "attacker's" use of Amazon Web Services to aid in cracking certificates.
Amy Harding

NIST sorting comments on cybersecurity framework - FierceGovernmentIT - 7 views

  •  
    Be careful what you ask for -- NIST is now sorting through all the public comments related to the cybersecurity executive order and 185 days to get the framework publish.
« First ‹ Previous 161 - 180 of 332 Next › Last »
Showing 20 items per page