IT Security Unplu...
Follow
Find
5.0K views | +0 today
IT Security Unplugged
IT Security news, reviews and blogs: www.itsecurityunplugged.com.
Your new post is loading...
Your new post is loading...
Scooped by IT Security Unplugged
Scoop.it!

Hack In Paris 2012

Hack In Paris 2012 | IT Security Unplugged | Scoop.it

A few events take place in France, but until now, no one had covered hacking practices with a technical approach including both professional training and information aspects.  It is this gap that Hack In Paris aims to fill.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Flashback malware removal tool

Flashback malware removal tool | IT Security Unplugged | Scoop.it

This update removes the most common variants of the Flashback malware. This update contains the same malware removal tool as Java for OS X 2012-003.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Flashback used payperclick ads to earn owners $4,000 a week

Flashback used payperclick ads to earn owners $4,000 a week | IT Security Unplugged | Scoop.it

The owners of the Flashback botnet may have earned $14,000 in three weeks due to adverts being placed on compromised computers.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Remember Stuxnet? Why the U.S. is Still Vulnerable.

Remember Stuxnet? Why the U.S. is Still Vulnerable. | IT Security Unplugged | Scoop.it

Last week, the Department of Homeland Security revealed a rash of cyber attacks on natural gas pipeline companies. Just as with previous cyber attacks on infrastructure, there was no known physical damage. But security experts worry it may only be a matter of time.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Is it possible to have too much cyber security?

Is it possible to have too much cyber security? | IT Security Unplugged | Scoop.it

"Any attempts at regulating the internet, no matter how well intentioned, will end up creating tools for oppression."

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

We Need More than a “Good Samaritan” Law for Cybersecurity Information Sharing

We Need More than a “Good Samaritan” Law for Cybersecurity Information Sharing | IT Security Unplugged | Scoop.it

With the US Senate planning to vote on cybersecurity legislation in early June, opponents of the legislation are stepping up their opposition. During the Memorial Day recess a coalition of groups plan to pressure members of Congress to oppose the two Senate cybersecurity bills: S. 2105, the Cybersecurity Act and S. 2151, the Secure IT Act.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

What is CISPA anyway?

What is CISPA anyway? | IT Security Unplugged | Scoop.it

CISPA would permit Internet companies to share confidential customer information with certain parts of the US government, including the NSA. As it currently stands, it wouldn’t require companies to turn information over to the government.  However, it’s not without precedent for a Web company to voluntarily turn sensitive customer information – potentially including health records, credit information and the like – over when a federal official asks in just the right tone of voice.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

SanDisk Cruzer Enterprise FIPS edition with McAfee Anti-Virus - 2GB USB flash drive

SanDisk Cruzer Enterprise FIPS edition with McAfee Anti-Virus - 2GB USB flash drive | IT Security Unplugged | Scoop.it

Check out this cool flash drive. SanDisk 2GB Cruzer Enterprise USB 2.0 With Malware Protection imposes mandatory, hardware-based encryption on all files together with password protection to safeguard data stored on company-issued drives both inside and outside the office environment.  Not bad for under $25!

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Support and Opposition of CISPA and the Cybersecurity Act

Support and Opposition of CISPA and the Cybersecurity Act | IT Security Unplugged | Scoop.it

CISPA, the Cyber Information Sharing and Protection Act, is back in the news, but now in the form of the Cybersecurity Act of 2012. These cybersecurity measures, if passed, would have significant impact on some of the largest corporations in the United States.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Taking Control of the Tor Network

Taking Control of the Tor Network | IT Security Unplugged | Scoop.it
This talk deals with weaknesses identified in the TOR network protocol and cryptography implementation. We manage to take control over users using this network and to access all your information and data exchanged despite cryptography.
more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

The danger of SCADA vulnerability exposure

It is well documented that critical infrastructure is vulnerable to attack and, although the effects of some of them have been publicized, the general concern is that it is a matter of time until one or more major attacks occur.
more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Data Classification: Why it is Important for Information Security

Data Classification: Why it is Important for Information Security | IT Security Unplugged | Scoop.it

Data Classification: Why it is Important for Information Security.  Once you know which data needs the most protection, you can properly allocate funds and resources to defend those assets.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

How Anti-Virus Software can really be Malware

How Anti-Virus Software can really be Malware | IT Security Unplugged | Scoop.it

A 2010 study by Google found 11,000 website domains hosting fake anti-virus software, accounting for 50% of all malware delivered via internet advertising.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Bruce Schneier on Trust, Security and Society at HITB 2012 Amsterdam

Bruce Schneier on Trust, Security and Society at HITB 2012 Amsterdam | IT Security Unplugged | Scoop.it

Based on his most recent book, “Liars & Outliers: Enabling the Trust that Society Needs to Thrive,” the talk covered some of the most important issues that directly affect individuals.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Apple Snubs Firm That Discovered Mac Botnet, Tries To Cut Off Its Server Monitoring Infections - Forbes

Apple Snubs Firm That Discovered Mac Botnet, Tries To Cut Off Its Server Monitoring Infections - Forbes | IT Security Unplugged | Scoop.it

Dr. Web's chief executive Boris Sharov, who says Apple never responded when the firm shared its findings on the Flashback botnet. 

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Fill Your Mobile Security Toolbox

Fill Your Mobile Security Toolbox | IT Security Unplugged | Scoop.it
Malware isn't the only threat to your smartphone. These handy utilities will block snoops and control rogue apps on your Android handset or iPhone.
more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

So what if you detected Malware?

So what if you detected Malware? | IT Security Unplugged | Scoop.it

Dealing with the malware threat isn’t a Boolean problem anymore. By that I mean being able to detect (and block) a malicious binary isn’t the conclusion to the threat, but rather it’s a perspective on the status of the threat – a piece of evidence tied to the lifecycle of a breach.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Angry Birds Malware Sparks $78,000 Fine

Angry Birds Malware Sparks $78,000 Fine | IT Security Unplugged | Scoop.it

British regulators crack down on the Latvian company behind the RuFraud malware scheme that placed 27 fake versions of Android apps, including Angry Birds Space, on Google Play.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

How to stop Google Ads from tracking you on the web

How to stop Google Ads from tracking you on the web | IT Security Unplugged | Scoop.it

It was recently revealed that Google and a number of advertisers had found a way to bypass some privacy features in modern web browsers, allowing them to forgo third-party cookie policies and serve targeted ads regardless of a user’s privacy settings.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

NSA Announces Cyber Security Program for College Students - eSecurity Planet

The U.S. National Security Agency (NSA) recently launched a new program, the National Centers of Academic Excellence in Cyber Operations, aimed at collaborating with colleges and universities to expand the numbers of professionals with skills in cyber operations. The program is an outgrowth of the National Initiative for Cybersecurity Education.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Trojan.Necurs.A Removal Report

Trojan.Necurs.A Removal Report | IT Security Unplugged | Scoop.it

Trojan.Necurs.A is a Trojan that encompasses malware dropper, rootkit and backdoor capabilities.  It makes use of rootkit techniques, and, thus, once installed can add a subkey into the Windows Registry, which allows it to start automatically whenever you boot your Windows.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

A CISO’s guide to Application Security

A CISO’s guide to Application Security | IT Security Unplugged | Scoop.it

This five-part series focuses on defining application security, outlining the elements of a comprehensive appsec program, educating about application- and software-related risks, determining the true cost of a data breach, and providing recommendations to CISOs for managing enterprise-level appsec.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Address the cyber threat now

Address the cyber threat now | IT Security Unplugged | Scoop.it

Life increasingly lived in the cyber domain faces a new quality and quantity of threats, said security experts at the first International Cyber Security Forum for Energy and Utilities.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

PHP-CGI Exploitation by Example - SpiderLabs Anterior

A vulnerability in PHP-CGI was recently disclosed which was met with lots of controversy and questions about how it was leaked before a patch was available.  For demonstration purposes, WordPress will be used as a test site for the examples that will follow in this article.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Metasploitable – Gaining Root on a Vulnerable Linux System

Metasploitable – Gaining Root on a Vulnerable Linux System | IT Security Unplugged | Scoop.it
As I mentioned in my previous post, Metasploitable is a purposefully vulnerable Ubuntu 8.04 image that is running several unpatched services.
more...
No comment yet.