Chase Cunningham – The Cynja, on Wednesday, 17 September 2014 wrote an article for Help Net Security around speaking inforsec with kids. As cybersecurity professionals, we know first-hand how the cyber world is filled with battles between good and evil. But do your kids know that? If you’re a parent, like me, chances are you’re concerned about your kids using the Internet. As they.
My friend Peter Nicolas Zavlaris at RiskIQ posted a great blog. Check out the RiskIQ Blog. It is a great source around information and cyber security. By Peter Zavlaris As the Internet continues to take a public relations drubbing due to the constant cadence of data breach reports and instances of online fraud—it’s important to maintain perspective. Let’s face it, the Internet.
What is reputation? By definition “Reputation is the opinion (more technically, a social evaluation) of the group of entities toward a person, a group of people, or an organization on a certain criterion. It is an important factor in many fields, such as education, business, online communities or social status”. Older security technologies use signatures of known bad elements however.
There are thousands of infected and fraudulent Web sites on the Internet, with new ones popping up every day. So how do you know if a site is safe to visit? Large corporations have the luxury of using commercial products that help protect their users from a central management site by taking advantage of network reputation. From firewalls to IDS/IPS, the corporations enjoy a level of security.
My friend and co-author of Web Penetration Testing with Kali Linux, Joey Muniz wrote about how to build a CCIE Security lab. This is an essential lab if you are studying for your CCIE Security and is current as of Sept. 9th 2014. The original post can be found HERE. I built a CCIE lab a while back and found the process to be a bit cumbersome. The hardware and.
Apple iPhones have some undocumented functions which allow persons in positions of power to wirelessly access an iPhone, and copy pictures, text messages, and other data without a password or PIN, a forensic scientist warned recently. Jonathan Zdziarski, an iOS expert, addressing a conference recently said he was not sure if Apple engineers used this function intentionally to allow the.
Josey Muniz, aka The Security Blogger describes Sourcefire anti-malware protection (AMP) services. Detecting threats on endpoints like laptops and mobile devices is important but not enough to defend against the threats we see against our users. Reason why is Anti-Virus and host IPS/IDS can only scan for so many signatures and leverage so many behavior checks before they must let the traffic.