Security through Obscurity
7.9K views | +0 today
Follow
Security through Obscurity
A system relying on security through obscurity may have theoretical or actual security vulnerabilities, but its owners or designers believe that the flaws are not known, and that attackers are unlikely to find them. The basis of STO has always been to run your system on a “need to know” basis. If a person doesn’t know how to do something which could impact system security, then s/he isn’t dangerous. The technique stands in contrast with security by design.
Curated by Yury Chemerkin
Your new post is loading...
Your new post is loading...
Scooped by Yury Chemerkin
Scoop.it!

Massive Top 100 security tips. Part V. Business continuality

The Social Media Story storified by Yury Chemerkin...

...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Massive Top 100 security tips. Part III. Physicial computer security

1. Before you turn on a computer check if it has weird objects connect to it. People could use physical keyloggers to gain your information.

2. Don't leave your smartphone, computer, laptop, notebook or whatever with personal information unattended or unsecured.

3. Lock your plugin hardware. People could gain acces to your working environment. It would be an easy way for an criminal to take the plugin hardware with him. Lock op your external harddrive, USB sticks.

4. Don't toss around with your USB sticks. Keep them safe and encrypt them!

5. When your harddisk or memory is declared dead be sure to dispose them in an secured way. Put them in an bag and hammer them to pieces. Great workout.

6. Don't mix your laptop that you use for you work as an multimedia laptop. Keep work and fun separated when dealing with information.

7. Turn off your WiFi, either in the OS or using a physical switch (if you have one), when not in use.

8. Almost any device can be used to record audio and/or video, including smartphones, watches and buttons.

9. Disconnect the internet cable when you are done with the computer. This will prevent a Wake on Lan attack.

10. Use secure wiping functionality (Disk Utility) or tools to erase drives/devices before giving or selling them.

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Massive Top 100 security tips. Part I. Social Engineering

The Social Media Story storified by Yury Chemerkin...

...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

A Letter to Kevin Mitnick

kmitnick@mitnicksecurity.com Givon Zirkind Dear Kevin: I recently finished reading “Ghost in the Wires”. I sent you an email through your agent. I did not get a response. You like a challenge?...
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Chronic Dev Team announces jailbreak for iOS 5.1.1 at HITB 2012 Amsterdam

The group made the big announcement at the end of their presentation of he Absinth Jailbreak...

...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Hack in the Box 2012 Amsterdam - Video overview

A short presentation of the events and showcases...

...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Google Apps update alerts: IPv6 will be permanently enabled on June 6th, 2012

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Fraudulent Digital Certificates: Signed Doesn't Necessarily Mean Benign

This presentation on fraudulent Digital certificates was given by Ziv Mador at InfoSec Europe.
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

RSA Conference Webcast: Code Red to Zbot: 10 Years of Tech, Researchers and Threat Evolution

Tim Rains, Director, Microsoft Jeffrey Jones, Director, Microsoft Windows XP just recently reached end of life. Bill Gates' TwC is now ten years old.
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Massive Top 100 security tips. Part IV. Password security

The Social Media Story storified by Yury Chemerkin...

...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Massive Top 100 security tips. Part II. Social Media

The Social Media Story storified by Yury Chemerkin...

...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Ghost In The Wires [Kevin Mitnick] – A Book Review

Ghost In The Wires – A Book Review This is an auto-biography really. But, as a spy thriller, the book reads very well. And, it's real! It is well written in the vernacular. Not too technical. But...
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Download Files Using Google and Rapidshare

Download Files Using Google and Rapidshare...

...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Bruce Schneier keynote at Hack in the Box 2012 Amsterdam

Bruce Schneier highlights the most important topics present in his latest book "Liars and Outliers".

...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Dream Team press conference at Hack in the Box 2012 Amsterdam

The Dream Team held a press conference right after announcing the availability of the new Absinthe jailbreak for iOS 5.1.1...

...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Security through Obscurity - Google+

Security through Obscurity - STO, Security through Obscurity - Security Through Obscurity (STO) is the belief that a system of any sort can be secure so long as nobody outside of its implementation group is allowed to find out anything...
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

We are legion -story of the hacktivists

a video about anonymous and it's story , enjoy...

...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Geographical Distribution of Web-based Malware

This presentation onWeb based malware was given by Ziv Mador at InfoSec Europe.
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Hakin9 Bible | IT Security Magazine - Hakin9 www.hakin9.org | Hakin9 Bible

Hakin9 Bible | IT Security Magazine - Hakin9 www.hakin9.org | Hakin9 Bible | Security through Obscurity | Scoop.it
More than 200 pages of the best hakin9 content. Attention!
more...
No comment yet.