background preloader

Compliance : Tech Center

Compliance : Tech Center

10 Massive Security Breaches -- InformationWeek They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit 1 of 11 In February 2007, TJX, parent company of discount stores T.J. Security breaches have only increased in scope and frequency in recent years, as more businesses store their data in digital files and thieves become increasingly sophisticated in how they gain access to those files. See Also Nasdaq Confirms Servers Breached Online Dating Site Breached Two Arrested For AT&T iPad Network Breach Schwartz On Security: First, Know You've Been Breached 100,000 Credit Cards Compromised By Data Breach

#OpTrapWire, Anonymous against surveillance systems In this days I have written several times regarding surveillance systems and the huge business around it. Private companies, government agencies and cyber units are all working to develop new tools to spy on wide audience. This tools are really attractive for those governments that desire to monitor and pursue dissident, in many cases these application arming the hands of the Executioner. A spyware is a tool and it could be used for good purposes as bad ones, we cannot demonize them, however, we must remain outraged when the companies in the name of money violate all kinds of rules to make profit at the expense of the human rights. It’s normal at this point that the voice of Anonymous thunder in defense of these rights by bringing the light of the sun a problem that is often shelved for obvious reasons, to talk about certain issues is inconvenient and detrimental to the interests of many. Which are the revelation made by Wikileaks? “God Bless America. The web site RT.com published

spychips.com - how RFID will compromise privacy, security, freedom Ludlam's TrapWire questions go unanswered The Australian Senate has voted against answering questions about the video-surveillance system known as TrapWire. Greens Senator Scott Ludlam asked the Senate today to question the government on whether TrapWire is being used locally. His motion was denied, however, without calling for a division of the assembly. Following the vote, Ludlam addressed the Senate, expressing his bafflement over why the motion was denied. "It simply asks — yes or no — whether these systems are deployed anywhere in Australia. "I would have thought that was a fairly straightforward request." The issue does not appear to be over, however, with Ludlam reinviting the government to address the chamber on the issue "so that we don't have to use other mechanisms". These include seeking answers from the Attorney-General, Defence minister and Home Affairs minister. "The Government could have done this the easy way. "All we want to know is whether the system operates here.

Things Every Computer Geek Should Know. « Arrow Webzine The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If you’re that type of person and are looking for a few extra skills to pick up, or if you’re a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know. How to become a real computer Geek? 1. 2. 3. 4. 5. 6. 7. 8. 9.

Body scanners set for November roll-out Body scanning equipment will be rolled out to all Australian international airports from November, despite lingering concerns about their effectiveness. The security machines, costing AU$230,000 each, produce a generic outline of the human body and reveal metal and non-metal items under clothing, unlike the unpopular and controversial scanners in the US, which can show intimate body features. They have already been trialled in Melbourne and Sydney. The scanners were originally to have been put into place by July, however, laws to allow the scanners were only passed by the Federal Parliament today. Transport Minister Anthony Albanese reassured airline passengers worried about privacy issues that images won't be copied or stored. In the US, US Marshals from a court house saved 35,000 images on their scanner. Albanese also assured passengers that the level of radiation put out by the scanners is low. But the Australian Greens warned that the machines could lead to a false sense of security.

Sysinternals Utilities Sysinternals SuiteThe entire set of Sysinternals Utilities rolled up into a single download. Sysinternals Suite for Nano ServerSysinternals Utilities for Nano Server in a single download. AccessChkv6.1 (February 17, 2017)AccessChk is a command-line tool for viewing the effective permissions on files, registry keys, services, processes, kernel objects, and more. AccessEnumv1.32 (November 1, 2006)This simple yet powerful security tool shows you who has what access to directories, files and Registry keys on your systems. Use it to find holes in your permissions. AdExplorerv1.44 (November 15, 2012)Active Directory Explorer is an advanced Active Directory (AD) viewer and editor. AdInsightv1.2 (October 26, 2015)An LDAP (Light-weight Directory Access Protocol) real-time monitoring tool aimed at troubleshooting Active Directory client applications. AdRestorev1.1 (November 1, 2006)Undelete Server 2003 Active Directory objects. Autologonv3.10 (August 29, 2016)Bypass password screen during logon.

Help us crack Gauss' encryption: Kaspersky Labs Kaspersky Lab is appealing to the public to help crack a code embedded in a piece of malware it believes is nation-state sponsored. Called Gauss, it is the latest in a string of malware that has possible links to Flame, Duqu and Stuxnet. Kaspersky researchers, so far, believe it is an espionage toolkit, designed to steal browser passwords, banking details and other credentials, but what it is meant to do on the intended target's computer is hidden within encrypted code. According to Kaspersky researchers, in order for the malware to deliver its payload to the intended victim only, the malware looks at certain aspects of the target's system configuration, including certain file or folder names present on the system. Researchers have already attempted to use millions of combinations of known folder names, but to no success. The company has now released sections of encrypted data, and is appealing for anyone who might be able to break the codes to contact Kaspersky Lab.

I.B.M. Aims to Sharply Simplify Corporate Data Center Technology It can take up to six months, research shows, to get a new business application up and running, from buying the hardware to fine-tuning the software. An estimated 70 percent of corporate technology budgets is spent on installing, updating and maintaining current technology — keeping the digital lights on. Although the problem has been developing for a long time, technology managers and analysts agree it is growing worse. That’s because the pace of technological change is accelerating and business users expect more services, faster. “The current model is broken, it doesn’t scale,” said Sunil Bajpai, group general manager for the Center for Railway Information Systems, the technology arm of India’s state-owned railway system. is bringing its answer to the marketplace on Wednesday — an effort that industry executives and analysts say is the most ambitious step yet to simplify and streamline data center technology.

Related: