For years, the security community has benefited from a virtuous circle consisting of vendors, researchers and media. Researchers perform a valuable task in working to identify weaknesses in products and technologies that could lead, in theory or in practice, to potentially preventable exploits and attacks. Vendors take that research and use it to make more secure products. Finally, the media reports publicly on the process to help ensure practitioners and product users can accurately assess risks related to these potential vulnerabilities
As the overpriced beers flowed and dusk approached in central London pubs surrounding the venue of RSA Europe last week, talk often turned towards the (ISC)2 security certification body.(ISC)2, which administers the widely recognised Certified Information Systems Security Professional (CISSP) qualification, was "a waste of money" and its board of directors "filled with a bunch of out-of-touch boobs" who are unaware of the practical issues in the working life of an infosec professional, we heard.Membership fees for the organisation are $85 a year. But what do the 80,000 (ISC)2 members get in return?A cursory search reveals that the beer-fuelled
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post. Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use. A SQL injection is a virus or bug that effects an application that is not properly coded or secured. There are many different configurations of various software used to build and run a website. An
Conference speakers of the future are to be given the opportunity to be mentored and trained via the ‘rookie track' at next year's Security B-Sides London.With offers of an experienced mentor to help the speaker prepare for a friendly, introductory environment, the rookie track is designed to bring new blood into the speaking circuit.B-Sides London rookie track co-organiser Robin Wood told SC Magazine that they were inviting people who have never spoken at a conference before to submit talks with full support available to help them with it.He said: “It can be very daunting to get up on stage and speak for an hour in front of a large group of
Back in May of this year, Internet security firm Bitdefender launched an App and service designed to help iOS users get a grip on what the apps installed on their mobile devices may be up to.
Dubbed “Clueful” by Bucharest, Romania-based Bitdefender, the App tells owners of iOS devices which applications may be accessing more information than they need, and identifies potentially “misbehaving” apps, giving users an inside look at all the information app developers can gather about a user. In simple terms, Clueful identifies
Free whitepaper – Forrester: Prepare For Anywhere, Anytime, Any-Device Engagement with a Stateless Mobile ArchitectureAustralia’s high end tech research engine NICTA will take a pivotal role in an US$18 million US Defence project which will develop software to protect the systems in drones from cyber attack.The US Defense Advanced Research Projects Agency (DARPA) awarded the 4.5 year contract to a global consortium, which includes Australia's NICTA, the Boeing Company, Galois, the University of Minnesota and led by Rockwell Collins. A team of six to eight dedicated NICTA researchers will be placed on the project with more staff added at peak
Your Post Has Been Launched!
Fabulous! Don't forget to share with your friends on Twitter and Facebook.
After a year spent looking at the dark underside of the Internet — including bestiality, necrophilia and child pornography — this Google contractor wasn't even hired full-time.
Sitting in the sun at a tech company cafeteria, this former Google worker described a year spent immersed in some of the darkest content available on the Internet. His role at the tech company mainly consisted of reviewing things like
Black Hat 2012 Former FBI executive assistant director Shawn Henry has warned that the biggest threat online comes not from terrorists or hackers, but from foreign intelligence organizations looking to steal intellectual property.
"The threat from computer attack is the most significant threat we face as a society, other than a weapon of mass destruction," he said in his opening keynote at the Black Hat 2012 conference in Las Vegas. "Everything we do – R&D, intellectual property, and corporate strategies – is stored or transmitted electronically. The DNA of companies is available to bad guys."
A firm that disguised Android malware as Angry Birds games has been fined £50,000 ($78,300) by UK premium-rate service regulator PhonepayPlus.
A1 Agregator posted mobile apps posing as smash-hit games, including Cut the Rope, on Android marketplaces and other outlets. Rather than offer free entertainment, the software silently sent out a text in order to receive a string of premium-rate messages, costing victims £5 per SMS. Users would have to uninstall the counterfeit apps from their phone to prevent further messages and charges.
The malicious code also covered up evidence of the message swapping which might
- The Language of UX: Beyond Buzzwords -
- Get practical information on how to develop your organization's mobile commerce application - Mobile Commerce World - Mobile Commerce World
- Get practical strategies to build a solid plan for profitability and success - Mobile Commerce World - Mobile Commerce World
- Delve into technologies and business issues around mobile payments and wallets - Mobile Commerce World - Mobile Commerce World
- Learn how to enage customers through mobility - Mobile Commerce World - Mobile Commerce World
- How to Start Your Big Data Journey
- Meeting the Unilever eScience Challenges: To out-compute is to out-compete
- Smarter Mobile Security: Securing BYOD
- Accelerate Agility Now: WebSphere Application Server v8.5.5 Overview
- Intelligent Management of WAS Applications: Reduce Cost, Complexity, and Errors
This Week's Issue
- Metzler: The 2013 Application and Service Delivery Handbook
- Comparison of Cisco and ShoreTel Unified Communication Solutions
- Don't Get Stuck on Your Virtualization Journey: Where to Focus Next
- How Virtualization is Key to Managing Risk
- Real World Considerations for Implementing Desktop Virtualization eBook