Skip to main content

Home/ Information Security/ Group items tagged and

Rss Feed Group items tagged

anonymous

Identity and Access Management: Explained in Detail - 0 views

  •  
    Identity and Access Management is an information security framework which focuses on the security of the digital identities in a workplace and enables an administrator to maintain control over the access to the company resources, both physical and digital
Rich Hintz

What a Botnet Looks Like - CSO Online - Security and Risk - 0 views

  • What a Botnet Looks Like
  •  
    Researcher David Vorel mapped interconnected, bot-infected IP addresses and created this geometric representation; CSO contributor Scott Berinato annotated the map and added interactive controls so you can zoom in and explore botnets' inner workings
Rich Hintz

AirMagnet - Enterprise Wireless Network Security and Troubleshooting - 0 views

  •  
    control over the entire lifecycle of the wireless LAN (WLAN) from network design and deployment to 24x7 intrusion prevention and troubleshooting. AirMagnet provides visibility into all aspects of your wireless airspace with the intelligence to automatically diagnose, explain and respond
Bart TheGuard

Kaspersky Lab discovers one of the most significant cyber-attacks ever! - 0 views

  •  
    Kaspersky Lab issued an important report on Monday (01.14.2013) about a major, extremely complicated cyber-attack that may have been operating since the year 2007. The famous antivirus company reported that it identified a sophisticated cyber espionage campaign, which targeted a wide range of government and diplomatic organizations located in Eastern Europe and Central Asia as well as in North America and Western Europe. That's some very powerful malware!
anonymous

Why should Penetration Testing be conducted frequently - 0 views

  •  
    The popularity of cloud computing and BYOD really brought information security to the forefront. The intruders also got smarter and more intelligent in finding new ways and new loopholes to attack. In order to deal with the future attacks, what a business…
Kiran Kuppa

"TrustyCon" security counter-convention planned for RSA refusniks - 0 views

  •  
    The RSA concerns started with documents leaked by Edward Snowden and published by the New York Times in December. These indicated that the NSA had worked with the National Institute of Standards and Technology to create a "backdoor" in the Dual Elliptic Curve Deterministic Random Bit Generator (Dual_EC_DRBG), a pseudorandom number generator designated as a standard for encryption. According to the documents, in 2004-even before NIST approved it as a standard-the NSA paid RSA $10 million to use Dual EC DRGB as part of its RSA BSAFE cryptographic library. This meant that much of the encryption software sold by RSA would allow the NSA to break the encryption using the known backdoor
  •  
    The RSA concerns started with documents leaked by Edward Snowden and published by the New York Times in December. These indicated that the NSA had worked with the National Institute of Standards and Technology to create a "backdoor" in the Dual Elliptic Curve Deterministic Random Bit Generator (Dual_EC_DRBG), a pseudorandom number generator designated as a standard for encryption. According to the documents, in 2004-even before NIST approved it as a standard-the NSA paid RSA $10 million to use Dual EC DRGB as part of its RSA BSAFE cryptographic library. This meant that much of the encryption software sold by RSA would allow the NSA to break the encryption using the known backdoor
Rich Hintz

Download PDF Password Remover 3.0 Free Trial - The PDF Password Remover can be used to ... - 0 views

  • PDF Password Remover
  •  
    decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing (changing), printing, selecting text and graphics (and copying them into the Clipboard), or adding/changing annotations and form fields. Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat (including 7.x, which features 128-bit encryption) are supported.
Skeptical Debunker

Web Posts May Make You Vulnerable To Crime : NPR - 0 views

  •  
    It's fun to brag when you're at a great bar or going off on vacation. Social networking sites and location-based apps have made it easy to broadcast that kind of information to your friends. The problem is that you may not just be making your friends jealous, but supplying criminals with useful information as well. A new Web site called PleaseRobMe.com has drawn attention to the issue by repurposing posts from foursquare, a social networking site that lets people share the latest about their whereabouts. PleaseRobMe demonstrates that it's easy for anyone to find out you're not at home - and therefore, are presenting an "opportunity" for burglary. "There are physical and economic safety risks when you're publicizing to the world where you are," says Kevin Bankston, a senior staff attorney with the Electronic Frontier Foundation. "It's obviously a treasure trove of information for criminals. PleaseRobMe is a good demonstration of how easy it is."
Seçkin Anıl Ünlü

Plugging the CSS History Leak at Mozilla Security Blog - 0 views

  • History Sniffing
  • Links can look different on web sites based on whether or not you’ve visited the page they reference.
  • The problem is that appearance can be detected by the page showing you links, cluing the page into which of the presented pages you’ve been to. The result: not only can you see where you’ve been, but so can the web site!
  • ...18 more annotations...
  • The most obvious fix is to disable different styles for visited versus unvisted links, but this would be employed at the expense of utility: while sites can no longer figure out which links you’ve clicked, neither can you.
  • David Baron has implemented a way to help keep users’ data private while minimizing the effect on the web, and we are deploying it to protect our users.
  • The biggest threats here are the high-bandwidth techniques, or those that extract lots of information from users’ browsers quickly.
  • The JavaScript function getComputedStyle() and its related functions are fast and can be used to guess visitedness at hundreds of thousands of links per minute.
  • we’re approaching the way we style links in three fairly subtle ways:
  • Change 1: Layout-Based Attacks
  • First of all, we’re limiting what types of styling can be done to visited links to differentiate them from unvisited links.
  • can only be different in color
  • the CSS 2.1 specification takes into consideration how visited links can be abused:
  • implement other measures to preserve the user’s privacy while rendering visited and unvisited links differently
  • Change 2: Some Timing Attacks
  • we are changing some of the guts of our layout engine to provide a fairly uniform flow of execution to minimize differences in layout time for visited and unvisited links.
  • when the link is styled, the appropriate set of styles is chosen making the code paths for visited and unvisited links essentially the same length.
  • Change 3: Computed Style Attacks
  • JavaScript is not going to have access to the same style data it used to.
  • Firefox will give it unvisited style values.
  • it’s the right trade-off to be sure we protect our users’ privacy.
  • fixing CSS history sniffing will not block all of these leaks. But we believe it’s important to stop the scariest, most effective history attacks any way we can since it will be a big win for users’ privacy.
Skeptical Debunker

Does promiscuity prevent extinction? - 0 views

  • Known as 'polyandry' among scientists, the phenomenon of females having multiple mates is shared across most animal species, from insects to mammals. This study suggests that polyandry reduces the risk of populations becoming extinct because of all-female broods being born. This can sometimes occur as a result of a sex-ratio distortion (SR) chromosome, which results in all of the Y chromosome 'male' sperm being killed before fertilisation. The all-female offspring will carry the SR chromosome, which will be passed on to their sons in turn resulting in more all-female broods. Eventually there will be no males and the population will die out. For this study, the scientists worked with the fruitfly Drosophila pseudoobscura. They gave some populations the opportunity to mate naturally, meaning that the females had multiple partners. The others were restricted to having one mate each. They bred several generations of these populations, so they could see how each fared over time. Over fifteen generations, five of the twelve populations that had been monogamous became extinct as a result of males dying out. The SR chromosome was far less prevalent in the populations in which females had the opportunity to have multiple mates and none of these populations became extinct. The study shows how having multiple mates can suppress the spread of the SR chromosome, making all-female broods a rarity. This is because males that carry the SR chromosome produce only half as many sperm as normal males. When a female mates with multiple males, their sperm will compete to fertilise her eggs. The few sperm produced by males carrying the SR chromosome are out-competed by the sperm from normal males, and the SR chromosome cannot spread.
  •  
    Promiscuous females may be the key to a species' survival, according to new research by the Universities of Exeter and Liverpool. Published today (25 February) in Current Biology, the study could solve the mystery of why females of most species have multiple mates, despite this being more risky for the individual.
Skeptical Debunker

Technology Review: Mapping the Malicious Web - 0 views

  • Now a researcher at Websense, a security firm based in San Diego, has developed a way to monitor such malicious activity automatically. Speaking at the RSA Security Conference in San Francisco last week, Stephan Chenette, a principal security researcher at Websense, detailed an experimental system that crawls the Web, identifying the source of content embedded in Web pages and determining whether any code on a site is acting maliciously. Chenette's software, called FireShark, creates a map of interconnected websites and highlights potentially malicious content. Every day, the software maps the connections between nearly a million websites and the servers that provide content to those sites. "When you graph multiple sites, you can see their communities of content," Chenette says. While some of the content hubs that connect different communities could be legitimate--such as the servers that provide ads to many different sites--other sources of content could indicate that an attacker is serving up malicious code, he says. According to a study published by Websense, online attackers' use of legitimate sites to spread malicious software has increased 225 percent over the past year.
  •  
    Over the past couple of years, cybercriminals have increasingly focused on finding ways to inject malicious code into legitimate websites. Typically they've done this by embedding code in an editable part of a page and using this code to serve up harmful content from another part of the Web. But this activity can be difficult to spot because websites also increasingly pull in legitimate content, such as ads, videos, or snippets of code, from outside sites.
Travis Post

Practical Computer and Information Security Tips - 0 views

  •  
    OnGuardOnline.gov provides practical tips from the federal government and the technology industry to help you be on guard against internet fraud, secure your computer, and protect your personal information.
anonymous

Fix Slow Running Computer Now - 0 views

My computer is running so slow so I contact Fix Slow Computers Online. They offer online computer support services to fix slow computers. They have the best computer tech specialists who know how t...

fix slow computers

started by anonymous on 12 May 11 no follow-up yet
timothy999

Current internet / ISP problems, slowness and attacks - 5 views

I've recently faced the same issue. Having asked Google, I found an interesting and informative article https://www.firesticktricks.com/why-is-my-internet-so-slow.html. It provided me with the poss...

web slow internet isp connection attack

Select Security  Systems Ltd

Low Voltage Wiring Edmonton - 1 views

  •  
    Select Security System provide Single Core Cables are mainly used for industrial and domestic uses and for low voltage wiring. They are mainly available in brown and blue color. These cables are used for audio and video signal transmission.
Albert Steno

Custom Flash Drives as Wedding Give-aways - 1 views

You might be surprised but yes we use Promotional USB Drives as our give-aways in our wedding last Saturday. My wife and I decided that we want to be different this time and since most of our guest...

USB custom flash drives computer tools

started by Albert Steno on 28 Mar 12 no follow-up yet
Kiran Kuppa

Applied Cryptography Engineering - Quarrelsome - 0 views

  •  
    "This article was written with several goals: to hurry along the process of getting Applied Cryptography off the go-to stack of developer references, to point out the right book to replace it with, and to spell out what you else you need to know even after reading that replacement. Finally, I wrote this as a sort of open letter to Schneier and his co-authors."
‹ Previous 21 - 40 of 139 Next › Last »
Showing 20 items per page