Hot Topics
Movie Hacking vs Real Hacking -

 

2 days ago | 0
Alter your perspective. An outside looking in approach to security -

My friend Peter Nicolas Zavlaris at RiskIQ posted a great blog. Check out the RiskIQ Blog. It is a great source. 

3 days ago | 0
Leveraging Reputation As A Security Defense -

What is reputation? By definition “Reputation is the opinion (more technically, a social evaluation) of the. 

3 days ago | 0

How to talk infosec with kids

By Aamir Lakhani | On Fri, Sep 19th, 2014 - No Comments »
CodyWelcome_Web_blub

Chase Cunningham – The Cynja, on Wednesday, 17 September 2014 wrote an article for Help Net Security around speaking inforsec with kids. As cybersecurity professionals, we know first-hand how the cyber world is filled with battles between good and evil. But do your kids know that? If you’re a parent, like me, chances are you’re concerned about your kids using the Internet. As they. 

Alter your perspective. An outside looking in approach to security

By Aamir Lakhani | On Thu, Sep 18th, 2014 - No Comments »
Alter_perspective

My friend Peter Nicolas Zavlaris at RiskIQ posted a great blog. Check out the RiskIQ Blog. It is a great source around information and cyber security. By Peter Zavlaris As the Internet continues to take a public relations drubbing due to the constant cadence of data breach reports and instances of online fraud—it’s important to maintain perspective.  Let’s face it, the Internet. 

Leveraging Reputation As A Security Defense

By Joey Muniz | On Thu, Sep 18th, 2014 - No Comments »
repsec

What is reputation? By definition “Reputation is the opinion (more technically, a social evaluation) of the group of entities toward a person, a group of people, or an organization on a certain criterion. It is an important factor in many fields, such as education, business, online communities or social status”. Older security technologies use signatures of known bad elements however. 

Free Advanced Internet Protection for Home from Norton using ConnectSafe

By Aamir Lakhani | On Mon, Sep 15th, 2014 - No Comments »
Nortonlogo1

There are thousands of infected and fraudulent Web sites on the Internet, with new ones popping up every day. So how do you know if a site is safe to visit? Large corporations have the luxury of using commercial products that help protect their users from a central management site by taking advantage of network reputation. From firewalls to IDS/IPS, the corporations enjoy a level of security. 

Fun building a CCIE Security home Lab

By Joey Muniz | On Tue, Sep 9th, 2014 - No Comments »
CCIE Security Logo

      My friend and co-author of Web Penetration Testing with Kali Linux, Joey Muniz wrote about how to build a CCIE Security lab. This is an essential lab if you are studying for your CCIE Security and is current as of  Sept. 9th 2014. The original post can be found HERE.   I built a CCIE lab a while back and found the process to be a bit cumbersome. The hardware and. 

Undocumented iOS program function allows monitoring of private data

By Aamir Lakhani | On Wed, Sep 3rd, 2014 - Comments Off
apple-design-award

Apple iPhones have some undocumented functions which allow persons in positions of power to wirelessly access an iPhone, and copy pictures, text messages, and other data without a password or PIN, a forensic scientist warned recently. Jonathan Zdziarski, an iOS expert, addressing a conference recently said he was not sure if Apple engineers used this function intentionally to allow the. 

Advanced Malware Protection AMP for Endpoints Overview

By Joey Muniz | On Tue, Aug 26th, 2014 - Comments Off
sourcefire-logo

Josey Muniz, aka The Security Blogger describes Sourcefire anti-malware protection (AMP) services. Detecting threats on endpoints like laptops and mobile devices is important but not enough to defend against the threats we see against our users. Reason why is Anti-Virus and host IPS/IDS can only scan for so many signatures and leverage so many behavior checks before they must let the traffic.