SecureIT
Follow
Find
656 views | +0 today
 

From around the web

SecureIT
Latest News on Information Security
Your new post is loading...
Your new post is loading...
Scooped by Rasika Dayarathna
Scoop.it!

Google Authenticator - Applications Android sur Google Play

Google Authenticator - Applications Android sur Google Play | SecureIT | Scoop.it
Pour protéger votre compte du piratage, activez la validation en deux étapes. Google Authenticator génère des codes pour la validation en deux étapes sur votre télépho...
more...
No comment yet.
Scooped by Rasika Dayarathna
Scoop.it!

Facebook 'eliminates porn attack'

Facebook 'eliminates porn attack' | SecureIT | Scoop.it
Facebook says a browser vulnerability was to blame for a pornographic spam attack, and a source suggests the firm knows the culprit.
more...
No comment yet.
Scooped by Rasika Dayarathna
Scoop.it!

Welcome to the home of the Legion of the Bouncy Castle. A fun place to stay, if you've got some time to kill.

Home of open source libraries of the Legion of the Bouncy Castle and their Java cryptography and C# cryptography resources...
more...
No comment yet.
Scooped by Rasika Dayarathna
Scoop.it!

Keys to the cloud castle

Keys to the cloud castle | SecureIT | Scoop.it
CONSIDER the purchase of a home in two adjacent gated communities. Both have houses with truly impregnable locks.
more...
No comment yet.
Scooped by Rasika Dayarathna
Scoop.it!

Bad spelling opens security hole

Bad spelling opens security hole | SecureIT | Scoop.it
Mistyping an email address can mean big security problems for lots of large companies, researchers have found.
more...
No comment yet.
Scooped by Rasika Dayarathna
Scoop.it!

First flaws in the Advanced Encryption Standard used for internet banking identified

First flaws in the Advanced Encryption Standard used for internet banking identified | SecureIT | Scoop.it
Researchers have found a weakness in the AES algorithm used worldwide to protect internet banking, wireless communications, and data on hard disks.
more...
No comment yet.
Scooped by Rasika Dayarathna
Scoop.it!

KisMAC Hacking Tutorial: How to crack WEP & WPA with Kismac - YouTube - Truveo Video Search

KisMAC Hacking Tutorial: How to crack WEP & WPA with Kismac - YouTube - Truveo Video Search | SecureIT | Scoop.it

Best WiFi Card For KisMAC : bit.ly New Update 0.3.1 tinyurl.com Questions: Website: tinyurl.com How to Crack WEP & WPA with KisMAC. KisMAC Step by Step Tutorial: Kismac without injection, Kismac with Injection, Edimax, Alpha or Hawking WPA with Dic.
more...
No comment yet.
Scooped by Rasika Dayarathna
Scoop.it!

About » LIRNEasia - a regional ICT policy and regulation think tank active across the Asia Pacific

About » LIRNEasia - a regional ICT policy and regulation think tank active across the Asia Pacific | SecureIT | Scoop.it
more...
No comment yet.
Scooped by Rasika Dayarathna
Scoop.it!

Child Exploitation & Online Protection Centre - internet safety - CEOP

Child Exploitation & Online Protection Centre - internet safety - CEOP | SecureIT | Scoop.it
The Child Exploitation and Online Protection Centre (CEOP) works across the UK tackling child sex abuse and providing advice for parents, young people and children about internet safety and online safety.
more...
No comment yet.
Scooped by Rasika Dayarathna
Scoop.it!

Innobuzz | Ethical Hacking Training Program - Colombo |

Innobuzz | Ethical Hacking Training Program - Colombo | | SecureIT | Scoop.it
Chapter 1 - Introduction
Chapter 2 - Networking & Basics
Chapter 3 - Footprinting
Chapter 4 - Google Hacking
Chapter 5 - Scanning
Chapter 6 - Windows Hacking
Chapter 7 - Linux Hacking
Chapter 8 - Trojans & Backdoors
Chapter 9 - Virus & Worms
Chapter 10 - Proxy Server & Packet Filtering
Chapter 11 - Denial of Service
Chapter 12 - Sniffer
Chapter 13 - Social Engineering
Chapter 14 - Physical Security
Chapter 15 - Steganography
Chapter 16 - Cryptography
Chapter 17 - Wireless Hacking
Chapter 18 - Firewall & Honeypots
Chapter 19 - IDS & IPS
Chapter 20 - Vulenrability Assessment
Chapter 21 - Penetration Testing
Chapter 22 - Session Hijacking
Chapter 23 - Hacking Web Servers
Chapter 24 - SQL Injection
Chapter 25 - Cross Site Scripting
Chapter 26 - Exploit Writing
Chapter 27 - Buffer Overflow
Chapter 28 - Reverse Engineering
Chapter 29 - Email Hacking
Chapter 30 - Incident Handling & Response
Chapter 31 - Bluetooth Hacking
Chapter 32 - Mobile Phone Hacking
more...
No comment yet.
Scooped by Rasika Dayarathna
Scoop.it!

Forensic Accounting Demystified

Forensic Accounting Demystified | SecureIT | Scoop.it
Forensic Accounting Demystified explores the exciting field of forensic accounting including investigative accounting and litigation support.
more...
No comment yet.
Scooped by Rasika Dayarathna
Scoop.it!

Handbook of Information Security Management:Risk Management and Business Continuity Planning

more...
No comment yet.
Scooped by Rasika Dayarathna
Scoop.it!

Hi-tech credit card racket busted

Hi-tech credit card racket busted | SecureIT | Scoop.it
sundaytimes.lk delivers the latest breaking news and information on the latest top stories, picture gallery, business, situtation report and more.
more...
No comment yet.
Scooped by Rasika Dayarathna
Scoop.it!

Wuala - Features - Secure Online Storage - Backup. Sync. Share. Access Everywhere.

Wuala is the secure online storage from Switzerland: all files are encrypted on your computer; your password never leaves your computer.
more...
No comment yet.
Scooped by Rasika Dayarathna
Scoop.it!

Hackers carry out website hijacks

Hackers carry out website hijacks | SecureIT | Scoop.it
Turkish hackers managed to re-direct visitors away from high-profile sites, including Vodafone and the Daily Telegraph.
more...
No comment yet.
Scooped by Rasika Dayarathna
Scoop.it!

Hidden - The most advanced theft tracking software for your Mac.

Hidden - The most advanced theft tracking software for your Mac. | SecureIT | Scoop.it
If your computer is stolen, Hidden will show you where it is and who has it.
more...
No comment yet.
Scooped by Rasika Dayarathna
Scoop.it!

Fields Computer Forensics - Expert Witness and Forensic Investigation

Fields Computer Forensics - Expert Witness and Forensic Investigation | SecureIT | Scoop.it
Fields Associates provide computer forensics services across the globe. Our digital and computer forensics department is now used by police forces, multi-national corporations and government institutions.
more...
No comment yet.
Scooped by Rasika Dayarathna
Scoop.it!

What laws are there to help protect me from cyberbullying? | Cyberbullying | Teacher advice | Teachtoday

What laws are there to help protect me from cyberbullying? | Cyberbullying | Teacher advice | Teachtoday | SecureIT | Scoop.it
The bullying of school staff - including cyberbullying - is never acceptable and you are protected by a range of laws...
more...
No comment yet.
Scooped by Rasika Dayarathna
Scoop.it!

Get Safe Online :: Beginner's guide

The internet is great. People like to email, chat and have fun online. We also use it to buy and sell things, do our taxes or bank online. The problem is online criminals.
more...
No comment yet.
Scooped by Rasika Dayarathna
Scoop.it!

Association of Certified Fraud Examiners

Association of Certified Fraud Examiners | SecureIT | Scoop.it
The Association of Certified Fraud Examiners provides anti fraud training and education to professionals in many industries.
more...
No comment yet.