background preloader

Recent Breaches Spur New Thinking On Cloud Security

Recent Breaches Spur New Thinking On Cloud Security

http://www.darkreading.com/attacks-breaches.asp

Kali: Martial Arts of Jason Bourne No defense. No evasion. No retreat. No moving away. How to Check for Flame By Jacob Kitchel The biggest cyber security related news story this week has been about the Flame/Wiper malware. The event has gotten high profile coverage by several media outlets. So far, there have been no strong indicators the Flame virus is tied to anything ICS or SCADA related. There has been plenty of speculation in the media coverage that Flame does target ICS environments based on its apparent sophistication and the countries in which infected machines were detected. RELATED STORIESFlame and SCADA SecurityFlame: ‘More Powerful than Stuxnet’New Stuxnet Waiting for Green LightStuxnet Loaded by Iran Double AgentsCyber Warning: Duqu’s BackDuqu Still at WorkDuqu Report: Code is Old SchoolStuxnet, Duqu Link Grows StrongerStuxnet to Duqu: The Waiting BeginsDuqu and Rumors of WarA New and Frightening Stuxnet

NSW Police Force seeks own social network The NSW Police Force is seeking expressions of interest from the IT industry for an internal social network that will allow police officers to communicate with each other and promote internal networking. At the moment, NSW Police's internal communications are limited to a monthly magazine, reference material on its intranet and a gated email system that is so restricted that not even the Commissioner and Deputy Commissioner have the ability to easily send all-staff emails without authorisation. Following a trial of an "innovation forum", NSW Police found a strong interest among police officers to comment and vote on issues brought forward by co-workers, even though the forum was not promoted to staff.

Unpatched Java vulnerability exploited in targeted attacks, researchers say Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6 -- in order to infect computers with malware, according to researchers from security vendor FireEye. So far, the vulnerability has been exploited in limited targeted attacks, FireEye's senior staff scientist Atif Mushtaq said Sunday in a blog post. "Most of the recent Java run-time environments i.e., JRE 1.7x are vulnerable." Proxy Firewall and Gateway Firewall: Introduction If you're new here, you may want to subscribe to my RSS feed. Thanks for visiting! The terms proxy firewall and gateway firewall are used synonymously.

How To… Embed This Infographic <a href= ‎"><img src=" title="10 How Tos" alt="How To Infographic" border="0" class="nopin" /></a><br />Source: <a href=' title='Interesting Facts'><a href=' title='Interesting Facts'>Today I Found Out</a></a> 1) How to drastically increase the life of your shaving razor The Good, The Bad and the Insecure This article is not written by me. I found it online, but only in one place so this is effectively a mirror for it. Enjoy /////////////////////////////////////////////////////////////////////////////// /************************************************** ***************************/ /* Tutorial: How to write a backdoor for OpenSSH. */ /* Date: June 29, 2005 */ /* Author: pikah (rvdwesten@gmail.com) */ /* Website: */ /* */ /* DISCLAIMER: */ /* This tutorial is published here for one reason only: To make the problem */ /* understandable for users who are interested in the way a sshd-daemon */ /* can be easily backdoored. Well this is one of the first tutorials I will write.

Daily Cuppa: patents, TrapWire and Apple-Samsung It's hump day, we're halfway through the week and we've got all the information on TrapWire, Apple-Samsung and patents to get your Wednesday started. Have you been wondering why WikiLeaks has been down, off and on, for a few days? Or have you seen the hashtag #trapwire on Twitter and not known what it's all about? ZDNet's Zack Whittaker has put together an in-depth FAQ that will hopefully answer all of your questions about this surveillance software that works in conjunction with CCTV, among other things, to predict criminal activity. If there's one thing that Apple and Samsung could probably agree on, it's that their ongoing patent dispute has been dragging on forever, and will continue to do so for quite a while yet.

Singapore suffers from 'false sense of security' Singapore's "vibrant" IT security environment, low rate of reported breaches and incidents, and not being at the frontlines of online attacks have lulled local businesses into a "false sense of security" which leaves them vulnerable. According to Ngair Teow Hin, founder and CEO of security firm SecureAge, the "vibrant" security scene in the city-state with more than 100 security companies here, and existing laws such as the Computer Misuse Act, help deter people from hacking into organizations here. This can be seen by the low number of reported security incidents, he added. The country is also not likely to be one of the primary targets for hackers and hactivist groups because of its small population size, Ngair pointed out.

Network Access Control Policy Please note that this policy has not yet been revised or converted to the new format. 1. Preamble A key principle underpinning a high standard of IT Security is that access to computer network resources should be authorised on a ‘need to use’ basis. Historically, most computers connected to the University network have had full access to almost every other computer on the University network, and most staff computers have had full access to the Internet.

Two Targets, One Bullet: How the Ultimate Sniper Rifle Was Made In 2007, when the Navy SEALs went looking for an alternative to the Barrett weapons system it already used — an ultra-high-caliber rifle capable of firing .5-inch cartridges at distances beyond 1,200 meters — it talked to the best weapons manufacturers across the globe. Eventually it contacted a small company with 50 employees, who, it had heard, could make a weapon suitable for its tactical and operational demands. [partner id="wireduk"] It didn’t buy American; it skirted around the excellence of German and Scandinavian weapons design; and, unsurprisingly, it didn’t call the Russians. It went British. It approached an enterprise that embodies a high-tech, design-focused approach, blending traditional British engineering with the latest technological innovation.

Chetan Surpur Sidestep is an open-source application for Mac OS X that sits quietly in the background, protecting your security and privacy as you browse the web. Say Hello to Sidestep The problem

Related:  HTTB 2nd Direct Distributions (V1)HTTB 2nd Ed. 08/22/2012 Direct Distributions (V2)HTTB Afternoon Ed. Direct Distribution (V1)HTTB Evening Ed.