tumblr visitor
Category: Information Security

Personnel Security/Social Engineering: Amazing mind reader reveals his ‘gift’

This video delivers a very clear message…….

Tagged with: , ,

Press Release: (ISC)2® Foundation to Offer US$145,000 for 2013 Information Security Scholarships

Grant opportunities available to women, undergraduate, graduate and post-graduate students and faculty worldwide; candidates must apply by March 31st   London, U.K., November 20, 2012 —  Students and academics pursuing education in information security can begin their applications for 2013

Tagged with: ,

Security: Dial M for mugging – how to stop iPhone robbers (and keep your date safe too)

iPhones are the hottest accessory — for robbers. A victim of brutal attack says don’t be a mug during or after the crime If you own an iPhone, you’re twice as likely to be the victim of phone mugging as

Tagged with:

Get Safe Online Week (22-25 October 2012)

Get Safe Online Week is almost upon us, and they promise a week of information, activities and awareness about online safety and cybersecurity never before seen in this country … let alone anywhere in the world. The aim: pick up

Tagged with:

Security: A cautionary tale about falling victim to economic espionage via the CPNI

This is an interesting video and demonstrates how easy it is to squeeze out minor pieces of information which could have massive implications for individuals or organisations.

Tagged with:

Press Release: New (ISC)2® Young Professionals Programme Offers Pathway into Cyber Security Field

Education and mentoring effort will give a leg up to young people who aspire to succeed as information security specialists—and help bridge a major skills shortage. London, U.K., 06 September, 2012 – (ISC)2® (“ISC-squared”), the world’s largest information security professional

Tagged with: , ,

Information Security: How cybercriminals and hacktivists use DDoS tools to attack

Remote access, shell booters, low-orbit ion cannons – read all about it here Network professionals know that distributed denial-of-service attacks are an ever-growing danger. The recent assault onTwitter is just the latest evidence. Using a mushrooming array of advanced tools, including pay-per-use services

Tagged with: , ,

Information Security: Q – When is bad security good? A – When you catch a pervert!

A 46-YEAR-OLD man’s secret computer stash of child pornography was discovered after he asked a workmate to record a television programme, a court has heard. Nicholas Hill, of Belvoir Crescent, Newhall, handed a memory stick to his colleague, who made the

Tagged with: ,

Information Security : Digital Forensics Proactive Or Reactive?

For a number of years digital forensics has referred to ‘the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law’. While collecting this digital evidence, to be used retrospectively in subsequent

Tagged with: ,

Information Security: Public ‘left in dark’ about cyber security failures

Many cyber security failures are still not detected – and even when they are, most are not reported to authorities or made known to the public, according to a study by the European Network and Information Security Agency. When large

Tagged with: ,
Top