The Daily Informa...
Follow
932 views | +0 today
The Daily Information Security Dose
The Daily Security Dose" is my way to maintain a list of links to website I consider to relevant and I use for my day to day advisory work
Curated by Joerg Asma
Your new post is loading...
Your new post is loading...
Scooped by Joerg Asma
Scoop.it!

VIEWPOINT: It’s Time To Get The Government Out Of The Mass Collection Business

VIEWPOINT: It’s Time To Get The Government Out Of The Mass Collection Business | The Daily Information Security Dose | Scoop.it
President Obama should use his power now to suspend bulk collection of telephone metadata.
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

With NSA Reforms, Obama Offers Peace to a Wary Silicon Valley | Threat Level | Wired.com

With NSA Reforms, Obama Offers Peace to a Wary Silicon Valley | Threat Level | Wired.com | The Daily Information Security Dose | Scoop.it
When Barack Obama announced his reforms of National Security Agency surveillance programs today, few people were as interested as Larry Page, Mark Zuckerberg, Tim Cook, Marissa Mayer, and Steve Ballmer.
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Das furchtbarste an unserer Cyber-Sicherheit ist unsere absolute Ahnungslosigkeit

Das furchtbarste an unserer Cyber-Sicherheit ist unsere absolute Ahnungslosigkeit | The Daily Information Security Dose | Scoop.it
Wir haben mit dem Online-Sicherheisexperten Peter Singer über sein neues Buch gesprochen, und die virtuellen Bedrohungen und Verteidigungen der Zukunft gesprochen.
Joerg Asma's insight:

I like Peter's view about what people believe cybersecurity is!

more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Flashback botnet is still active, Mac users are warned

Flashback botnet is still active, Mac users are warned | The Daily Information Security Dose | Scoop.it
Intego Malware Research Team discovered that OSX Flashback trojan is still active with sinkholing activity. Mac users must be aware.
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

How the NSA Monitors Target Computers with Radar Wave Devices - InfoSec Institute

How the NSA Monitors Target Computers with Radar Wave Devices - InfoSec Institute | The Daily Information Security Dose | Scoop.it
Introduction Germany’s Der Spiegel has published a couple of disturbing articles on the NSA surveillance activities.
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Mit Big Data gegen Fukushima

Mit Big Data gegen Fukushima | The Daily Information Security Dose | Scoop.it
Die Hacktivisten von Safecast bieten Geigerzähler-Workshops an und konnten inzwischen eine detaillierte globale Datenkarte aufbauen, die unabhängige Informationen zum Schutz vor Radioaktivität biet…
Joerg Asma's insight:

This Motherboard article describes how big data is being used to get better information about nuclear pollution in Japan. 

more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Schneier on Security: FEEDTROUGH: NSA Exploit of the Day

Schneier on Security: FEEDTROUGH: NSA Exploit of the Day | The Daily Information Security Dose | Scoop.it
Joerg Asma's insight:
I like Bruce's pragmatic view on security - now: NSA Exploit of the day?! This is tough stuff! Imagine how many exploits have been published during the last 6 months related to the NSA and how many have been disclosed by other ressources.
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Forget Fingerprints, Your Face Is A Security Key

Forget Fingerprints, Your Face Is A Security Key | The Daily Information Security Dose | Scoop.it
No system is unhackable. But to hear Hector Hoyos describe his company’s latest security offering, it’s hard to imagine cyber-intruders easily breaking through the barriers he’s created.
Joerg Asma's insight:

I am a sceptic person when it comes to biometrics. Nevertheless I like the aspect of how to fool such a system. It gives us a few insights about the "must have features" like micro movement detection etc

more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

How to disappear on the internet (Infographic)

How to disappear on the internet (Infographic) | The Daily Information Security Dose | Scoop.it
Source
Joerg Asma's insight:

Interesting - more and more people think about how to disappear from the internet and delete their digital footprint.

more...
No comment yet.
Rescooped by Joerg Asma from Higher Education & Information Security
Scoop.it!

CISO: The great enabler?

CISO: The great enabler? | The Daily Information Security Dose | Scoop.it

The CISO role is now working with lines of business, says Arthur Lessard, CISO, Universal Music Group. Karen Epper Hoffman reports.

 

"Once considered the executive most likely to nip a plan in the bud, the chief information security officer (CISO) is quickly becoming the person most likely to help make things happen. "


Via Higher Ed InfoSec Council
Joerg Asma's insight:

I like his view and fully support it. The role of the CISO will become more and more important. Security is a boardroom issue and I am willing to accept a bet on the role of the CISO in large scale organizations in 10 years time.

 

more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Applying Big Data Approaches to Information Security a Challenge

Applying Big Data Approaches to Information Security a Challenge | The Daily Information Security Dose | Scoop.it
Applying big data approaches to information security can help enterprises build better situational awareness capabilities, but implementation could prove to be a major challenge, security experts said at the RSA Conference 2013 being held here this...
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Flashfake Mac OS X botnet confirmed

Flashfake Mac OS X botnet confirmed | The Daily Information Security Dose | Scoop.it
Earlier this week, Dr. Web reported the discovery of a Mac OS X botnet Flashback (Flashfake). According to their information, the estimated size of this botnet is more than 500, 000 infected Mac machines.
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Target breach linked to global cybercrime

Target breach linked to global cybercrime | The Daily Information Security Dose | Scoop.it
A couple of shoppers leave a Target store on a rainy afternoon in Alhambra, California on December 19, 2013
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Journey Into Incident Response: It Is All About Program Execution

Journey Into Incident Response: It Is All About Program Execution | The Daily Information Security Dose | Scoop.it
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Cybercrime: How to deal with Cyber risks and cyber crime in your organization | Larry Putterman articles

Cybercrime: How to deal with Cyber risks and cyber crime in your organization | Larry Putterman articles | The Daily Information Security Dose | Scoop.it
Learn how you can protect your company from cybercrime. New technologies can help you avoid cyber risks that include forfeiting intellectual property, damaging reputation, disruption of business functions and more.
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Perception of cyberwarfare in US defence and society

Perception of cyberwarfare in US defence and society | The Daily Information Security Dose | Scoop.it
Which is the perception of cyberwarfare in the US Government and within the American population? How much cost Information warfare to the US citizens?
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Wie ein NSA-Agent bei der Rettung der Online-Sicherheit mitarbeitet

Wie ein NSA-Agent bei der Rettung der Online-Sicherheit mitarbeitet | The Daily Information Security Dose | Scoop.it
Durch den Rauswurf eines NSA-Agenten aus dem Vorstand wollte eine Gruppe von Code-Entwicklern ihre Unabhängigkeit sichern. Nur leider, wurde nichts draus.
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

How the NSA Monitors Target Computers with Radar Wave Devices

How the NSA Monitors Target Computers with Radar Wave Devices | The Daily Information Security Dose | Scoop.it
If you desire to read the details on each of the above components and discover how NSA used it please read my article at Infosec Institute "How the NSA Monitors Target Computers with Radar Wave Devices"...
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Pump Up Your Brand with These Social Media Strategies - Business 2 Community

Pump Up Your Brand with These Social Media Strategies - Business 2 Community | The Daily Information Security Dose | Scoop.it
Joerg Asma's insight:

Personal Branding based on social media seems to be so easy. But these 5 steps are based on one key behaviour: discipline to execute!

more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

How should states fight the NSA? Turn off the water, say some

How should states fight the NSA? Turn off the water, say some | The Daily Information Security Dose | Scoop.it
CA senators want to bar law enforcement from helping; others would go further.
Joerg Asma's insight:

The chain of argumentation is compelling - but unrealistic?

I have more concerns regarding the water consumption generally 1.7 million gallons of water per day to cool down NSA supercomputers is a big deal - especially when you think about the value of water and the fact that water becomes a more and more valuable ressource that is not affordable to everyone. Is this environment sustainable?

more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Just Delete Me | A directory of direct links to delete your account from web services.

Just Delete Me | A directory of direct links to delete your account from web services. | The Daily Information Security Dose | Scoop.it
Joerg Asma's insight:

There seems to be the wish be deleted from the internet!

more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

80+ Best Free Hacking Tutorials

80+ Best Free Hacking Tutorials | The Daily Information Security Dose | Scoop.it
Joerg Asma's insight:

a good collection of tools, sites, tutorials and generally good starting point to learn....

more...
No comment yet.
Rescooped by Joerg Asma from Higher Education & Information Security
Scoop.it!

Amid a barrage of password breaches, “honeywords” to the rescue

Amid a barrage of password breaches, “honeywords” to the rescue | The Daily Information Security Dose | Scoop.it

Security experts have proposed a simple way for websites to better secure highly sensitive databases used to store user passwords: the creation of false "honeyword" passcodes that when entered would trigger alarms that account hijacking attacks are underway.

 

The suggestion builds on the already established practice of creating dummy accounts known as honeypot accounts. It comes as dozens of high-profile sites watched user data become jeopardized—including LivingSocial, dating site Zoosk, Evernote, Twitter, LinkedIn, and eHarmony to name just a few from the past year. Because these dummy accounts don't belong to legitimate users of the service and are normally never accessed, they can be used to send a warning to site administrators when attackers are able to log in to them. The new, complementary honeyword measure—proposed in a research paper titled "Honeywords: Making Password-Cracking Detectable—was devised by RSA Labs researcher Ari Juels and MIT cryptography professor Ronald Rivest, the latter who is the "R" in the RSA cryptography scheme.


Via Higher Ed InfoSec Council
Joerg Asma's insight:

From Honeypot 2 HoneyWord - interesting approach, but hoy to avoid honeywords u dont know

more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

The Evolution of Stuxnet, Duqu and co...

Joerg Asma's insight:

Interesting article about the evolution of #duqu and #Stuxnet - a must read about malicious code

more...
No comment yet.