background preloader

HTTB 2nd Direct Distributions (V2)

Facebook Twitter

Anonymous says it hacked 10M PSN accounts; Sony disagrees – ZDNet. ZDNetAnonymous says it hacked 10M PSN accounts; Sony disagreesZDNetAnonymous claims to have struck again as far as the Sony PlayStation Network is concerned, but the whole matter appears to be a hoax.

Anonymous says it hacked 10M PSN accounts; Sony disagrees – ZDNet

See on www.zdnet.com. How to Secure Data by Addressing the Human Element – CIO. How to Secure Data by Addressing the Human ElementCIO”We define social engineering as understanding what makes a person think, tick, and react and then using those emotional responses to manipulate a person into taking an action that you want them… See on www.cio.com.

How to Secure Data by Addressing the Human Element – CIO

News Corp sets up global ethics team in wake of hacking scandal – Reuters. The World's Leading Source for LGBT News and Entertainment. Online Identity Risk Calculator. Backtrack 5 r3 List of (some of the) new Tools and Programs … CYBER ARMS – Computer Security.

Backtrack 5 r3 List of (some of the) new Tools and Programs …

Cyber War News and Business Computer Tips … Vulnerability Assesment. Lynis – Scans systems & software for security issues; DotDotPwn – Directory Traversal fuzzer. Exploitation Tools … See on cyberarms.wordpress.com. Computer Security Firm Struggles with Newly Disclosed Virus … Large Telecoms Offer A Full Menu Of Security Services, But Not … States / Tamil Nadu : Award for painstaking police work. The recognition for 35 officers who have been chosen for medals by the Centre and State for meritorious service and excellence in criminal investigation/public service has come as a shot in the arm for the Tamil Nadu Police.

States / Tamil Nadu : Award for painstaking police work

In 2011-12, dozens of complex cases were cracked by the police across the State, thanks to the commitment and painstaking work of the investigators. For instance, the Cyber Crime Cell of the Chennai Police secured the first conviction for child pornography under the Information Technology (amended) Act of 2008 in the country. Acting on an alert issued by the Interpol, the Chennai Police apprehended Wilheums (58), a Dutch national, in November 2009. Dr. M. The suspect, who was allegedly uploading child pornography pictures from a house at Choolaimedu here, was detained. In the case of Superintendent of Police (Crime Branch CID) S. The 13-year-old Dilson of Chennai was shot dead in the Defence Residential complex where he went to pluck fruits on July 3 last year.

Cloud Computing Cyber Security. Cloud Computing Cyber Security Making the cloud your first line of defense helps to keep intruders away from your network By: John Shepler In days of yore, when castles were in vogue, the nobles found that massive stone fortifications were not enough to secure them from determined invaders.

Cloud Computing Cyber Security

What they did was to ring the castle grounds with a deep water-filled ditch called a moat. This effectively prevented sieges from battering rams and tunneling under the castle walls. The lesson here is that your infrastructure is much easier to defend if you don’t let the bad guys anywhere near the main line of defense. Castle Wall Becomes Firewall Now let’s fast-forward to the 21st century and see how these medieval lessons-learned can protect our networks.

Manhattan DA's office to get $4.2 million crime lab to investigate cyber crooks. IT Security News and Security Product Reviews - SC Magazine. NCSAM Resource Kit - Information Security Guide - Internet2 Wiki. 2013 Campus Events Below is a comprehensive list of 2013 higher education NCSAM events.

NCSAM Resource Kit - Information Security Guide - Internet2 Wiki

We collected over 190 links this year (a new record)! It's never too early to start planning your 2014 activities. CCD COE - National Strategies & Policies. The selection below provides links to national cyber security policy and legal documents, including national security and defence strategies identifying cyber, national cyber/information security strategies, and relevant legal acts.

CCD COE - National Strategies & Policies

If you see any inconsistencies or would like to notify us of changes or new additions that we have missed, please write to legal-at-ccdcoe.org Updated on 10 March 2014 NATO Nations BelgiumNational cyber security strategyCyber Security Strategy. Securing Cyberspace (2012) Dutch | French | English CanadaNational cyber security strategyCanada’s Cyber Security Strategy. Czech Republic National cyber security strategyStrategy of the Czech Republic in the Field of Cybernetic Security 2012 – 2015 (2011) Original | EnglishAction Plan for Cyber Security Strategy of the Czech Republic for years 2012-2015 (2011) Original | English.

Getting Ready for October Awareness Month. As some of you may already know, October is National Cyber Security Awareness month in the United States.

Getting Ready for October Awareness Month

Led by the National Cyber Security Alliance, and co-sponsored by MS-ISAC and DHS, the goal is to make the United States public aware of cyber security issues and how to better protect themselves. This October will be the 9th anniversary of the event. In addition, ENISA is looking to expand Security Awareness month to Europe. As such, October is the perfect time to add new features to your awareness program, reinforce key points, or perhaps even kick off your awareness program if you do not currently have one. Here are some ideas to consider. Survey: Conduct a security awareness survey to see just how aware your organization is. Challenge: Why not have a challenge and get your employees involved. Lunch-n-Learn: Free food is a great way to bring people together.

What ideas are you or your organization considering?