Breaches
More Talks with Anti-Jihadi Hacker The Jester
February 04, 2010 Added by:Anthony M. Freed
Anti-jihadi hactivist The Jester (th3j35t3r), the self-proclaimed Nicest Hacker in the World, has returned for part two of our conversation concerning his campaign of intermittent disruption of militant pro-jihad websites.
Comments (1)
In Rebuke of China
February 02, 2010 Added by:Tom Schram
In the current issue of Foreign Affairs, former NATO Commander General Wesley K. Clark and current Department of Veteran Affairs CTO Peter Levin write: “There is no form of military combat more irregular than an electronic attack: It is extremely cheap, is very fast, can be carrier out anonymously, and can disrupt or deny critical servi...
Comments (3)
Hacktivist Tactics Raise Ethical Questions
January 27, 2010 Added by:Anthony M. Freed
Recently we have witnessed the emergence of international hactivist and vigilante “the Jester” through his crusade against jihadi and militant Islamic networks...Jester’s activities raise an important question: Where do cyber vigilantes fall on the infosec ethics spectrum?
Comments (19)
Is the Recent Chinese Google Hack the most Serious Privacy Breach of the Year?
January 21, 2010 Added by:Brent Carey
Last week Google announced that it was the victim of a hack in China. Word of the attack spread quickly and the German, French and Australian governments issued warnings about using internet Explorer. I'm amazed that this incident has not received more commentary from the privacy and security communities. Is this not the most serious data privacy breach in a search engine’s histo...
Comments (1)
Rockyou.com - Gets Rocked again - this time a PII Lawsuit
January 02, 2010 Added by:Jason Remillard
Well, its happened. This time, the users themselves have taken action against rockyou.com for their inadvertent disclosure of customer information. As we previously reported, Rockyou was hacked and disclosed it looks like over 32,000,000 accounts. Yes, 32 Million!
Comments (1)
aweber comes clean, sort of....splatter effect continues
December 22, 2009 Added by:Jason Remillard
While finally acknowledging their security exposure, aweber has done little to placate its user base judging by the responses and pleadings I've seen online. Yes another example of what I'm calling the 'splatter' effect. The damage that is borne upon others related to the security exposure, that is usually not measureable but definately has an impact.
Comments (0)
It’s ‘Defense in Depth’, not ‘Dense in Depth’
December 18, 2009 Added by:Bill Wildprett, CISSP, CISA
I sit, dumbfounded with amazement after reading that insurgents in Iraq have been intercepting Predator drone video feeds and that the Pentagon has known about this for a year now.
Comments (1)
Unu Cracks a Wall Street Journal Conference Site, Not WSJ.com
December 04, 2009 Added by:Daniel Kennedy
Unu, the security researcher from Bucharest Romania known for performing unsolicited penetration tests on brand name web sites with a concentration in SQL Injection is at it again, this time with a claim that he cracked WSJ Online.
Comments (0)
A Host of Insecurities about Security
October 21, 2009 Added by:Sudha Nagaraj
Security concerns will continue to dominate the IT sphere for a while. Governments are crying hoarse to put in preventive measures, the security industry is struggling to make up for losses suffered in a recessionary environment, enterprises are growing paranoid about the ‘insider threat’ and the small and medium enterprises are waking up to the need for security management.
Comments (0)
Extremely Sensitive US Secrets Found on P2P Networks
July 29, 2009 Added by:Infosec Island Admin
According to an article released by the Washington Post today, private firm, Tiversa, Inc, discovered extremely sensitive information on global P2P Networks.
Comments (0)
Marine One Breach Has Winners and Losers
March 01, 2009 Added by:Anthony M. Freed
Billions of dollars are spent on security every year, and it can be trumped by one lapse in judgment. That is a tremendous amount of resources committed to security just to have it undermined by the whim of one individual, and it underscores the precariousness of secure systems...
Comments (2)
Heartland Breach Bad As Tylenol Poisonings?
January 25, 2009 Added by:Anthony M. Freed
The company issued statements Friday (1/23) in an effort at damage control in which the CEO compares the potential industry-wide impact of the breach to none other than that of the Tylenol poisonings of some twenty-five years ago that nearly brought down the drug maker...
Comments (7)
- Reddit Names Allison Miller as Chief Information Security Officer (CISO)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids