background preloader

HTTB 2nd Ed. Direct Distribution (V1)

Facebook Twitter

The Difference between ICS/DCS and SCADA. There is very little in common between the two, other than the fact that they both have an element of control,” stated James Arlen, the CISA and Senior Consultant for Taos. In today’s Information Technology space these two … See on www.tripwire.com. Shamoon malware infects computers, steals data, then bricks them – ZDNet. ZDNetShamoon malware infects computers, steals data, then bricks themZDNetSecurity researchers are investigating a piece of destructive malware that has the ability to overwrite the master boot record of a computer, and which they suspect is being… See on www.zdnet.com.

Shamoon malware infects computers, steals data, then bricks them – ZDNet

Identity-theft scam feared by firefighters – Identity Theft Manifesto. Data Security – Spotting and preventing the ‘insider threat’ ICS-CERT Warns of Serious Flaws In Tridium SCADA Software – it … Phishing threat becomes even bigger. Rising Antivirus Free Edition 23.00.66.45 Free Obengmin Program. Information Technology (IT) News, UK IT Jobs, Industry News. Cyber security boot camp to educate potential cyber spooks – ComputerWeekly.com. Cyber security boot camp to educate potential cyber spooksComputerWeekly.comA group of about 30 young people will attend a cyber security boot camp next month set up by the organisations responsible for the Cyber Security Challenge .

Cyber security boot camp to educate potential cyber spooks – ComputerWeekly.com

See on www.computerweekly.com. Read more – SpearTip – Cyber Counterespionage – Incident Response. Identity theft cases on the rise. Book Review: The Story Behind the 'Zubulake v. UBS Warburg' Case. Many legal professionals are familiar with Zubulake v.

Book Review: The Story Behind the 'Zubulake v. UBS Warburg' Case

UBS Warburg , which dictates how organizations manage and govern electronically stored information in litigation. In her new self-published book, Laura Zubulake tells the story that made the case. The ALM ® and LexisNexis ® Content Alliance LexisNexis ® is now the exclusive third party online distributor of the broad collection of current and archived versions of ALM’s legal news publications. LexisNexis ® customers will be able to access and use ALM’s content by subscribing to the LexisNexis ® services via lexis.com ® and Nexis ® .

ALM’s content plays a significant role in your work and research, and now through this alliance LexisNexis ® will bring you access to an even more comprehensive collection of legal content. If you are not currently a LexisNexis subscriber, contact 1-800-227-4908 to find out more or click here to have a customer representative contact you directly . Attorney general’s strike force says stopping – Identity Theft Manifesto. Bad assumptions about cloud computing and the Patriot Act. Anyone reading about the Cloud has heard the common dangerous assumption that the Patriot Act gives the government unprecedented access to your data.

Bad assumptions about cloud computing and the Patriot Act

The misconception is that the level of access that the government has in the cloud is beyond what they would have if the data were hosted elsewhere. Recently the European Commission Vice-President Viviane Reding, “spearheaded and vigorously advocated for the Commission's proposals to update and modernize the privacy framework in Europe through a detailed new Regulation.” According to CSO Magazine, Commissioner Reding cried foul late last year when an EU Cloud Computing service suggested that there would be an advantage to its geographic location because it would protect customers from the reaches of the USA Patriot Act. We live in a time, unfortunately, where many European countries have strict privacy laws which provide governments with “expedited access” to Cloud data.

And the Patriot Act? Should National Security trump personal security? Big Data's Evolving Role in E-discovery: What Is Predictive Coding? Big Data's Evolving Role in E-discovery: What Is Predictive Coding?

Big Data's Evolving Role in E-discovery: What Is Predictive Coding?

Posted by August 17, 2012 Trying to understand big data recalls the story of the blind men touching an elephant. Although we don't have a clear picture of the totality of the big data elephant, we can still learn something from each part that we touch. Understanding the role of big data in e-discovery is one such example. (Note that the following discussion focuses on the use of predictive coding, which is an analytical technology for processing e-discovery "big data. " The purpose of civil litigation is to determine who wins a lawsuit, and who loses money. The Common Scold: Continuing Legal Education in a Digital World. « Crunching Numbers | Main | #ILTA2012 Opening Day » Continuing Legal Education in a Digital World Nancy Patterson -- president and CEO of LitigatorTechnology.com -- addresses the challenges facing small firm practitioners, on the American Bar Association's GP-Solo eReport website.

The Common Scold: Continuing Legal Education in a Digital World

She interviewed several sources (including me) for the article, which discusses everything from how lawyers are using online courses, to how they choose real-time live programs (says Debora Faust: "Topic, location, and cost. ")