You are the content you publish.
Sign up with Facebook
Sign up with Twitter
I don't have a Facebook or a Twitter account
Start a free trial of Scoop.it Business
Are you sure you want to delete this scoop?
The hack and data breach at the European Central Bank (ECB) in Frankfurt highlights classic challenges facing organisations, say security experts
The solution to avoid using Linux hardening checklists for your servers is simple. With proper automation and regular checks, checklists could be avoided.
Archived information on prior SANS US and EU Digital Forensics Summits.
Found on reddit, the front page of the internet.\n\n174 points and 36 comments so far
Facebook and members of the Open Compute Project overhaul the critical Top-of-Rack (TOR) switch, with an eye on improving data center efficiency and reducing costs.
SANS Internet Storm Center - A global cooperative cyber threat / internet security monitor and alert system. Featuring daily handler diaries with summarizing and analyzing new threats to networks and internet security events.
This discovery has a chance (as small as it may be) to reduce the amount of time we all spend in TSA lines.
As we discussed before, this is our third installment in our Nmap series. Nmap is well known for port scanning, port discovery, and port mapping. But we ca
RpcView is a free tool that can be used to monitor and decompile all registered interfaces on windows operating system. Information provided by this tool
Delving further into crypto evolution, Chris Soghoian focuses on the relationship between law enforcement and companies that adopted strong privacy algos.
An analysis of 400 million search engine visits to 10,000 sites done by Incapsula researchers has revealed details that might be interesting...
F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest online threats to guarantee your online wellbeing.
Early use of digital forensics can prove invaluable in a company’s investigation and legal pursuit of a renegade employee
The results of IBM's "2014 Cyber Security Intelligence Index" show that the majority of organizations are more vulnerable than they think.
New features within Phishing Frenzy and a walkthrough guide of launching HTA Powershell attacks leveraging Phishing Frenzy, BeEF, PowerSploit, and Metasploit.
Have you on YouPorn lately, perhaps? White House website?
A collection of security data science research papers
Introduction People feel endangered by cyberterrorists, and this topic has raised an alarm in many societies. Many experts in the IT field and many politic
Introduction In this tutorial, we'll take a look at how we can hack clients in local network by using WPAD (Web Proxy Auto-Discovery). The WPAD protocol al
I've compiled 25 performance monitoring and debugging tools that will be helpful when you are working on Linux environment. This list is not comprehensive or