Tuesday, December 27, 2011

DIY security testing.

Penetration testing has been hailed as an effective way to keep the wolves from your corporate door, but often it is considered too hard or too expensive. While many organisations hire external pen testers to probe their networks, there are some tests that can be run in-house.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Keeping children safe on their new internet technology.

In a poll of over 19,000 parents and children conducted by security firm Norton, 7% of UK parents said they had absolutely no idea what their kids were up to on their computers and phones.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Monday, December 26, 2011

Smart Grid Security Threatened By Fragmented Control.

Cybersecurity wasn't the only IT fix the MIT study recommended to bolster the power grid in the future. The researchers also suggested that the energy industry do more R&D into using IT for bulk power system operations and planning for power transmission over wide geographic areas.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Most Cellular Networks Worldwide Vulnerable to Attack.

A German security researcher this week is detailing a manner in which the leading cellular networks worldwide are all vulnerable to attack.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

The 10 biggest tech stories of 2011.

Very influential tech pioneers died; cyber-security cost companies billions of dollars; and trends in electronics and on the Web provided new tools and created new challenges.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Congress Wants To Ban The Taliban From Twitter.

The Chair of the Senate Homeland Security Committee, Jow Lieberman, has called upon Twitter to block accounts being used for "Taliban propaganda." Apparently, the Taliban has taken to the social network as a means of quickly promoting its attacks, particularly in Afghanistan. The tweets in question range from detailed play-by-plays of terrorist attacks to almost completely fabricated reports and death tolls.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Sunday, December 25, 2011

Fraudulent Emails Appearing to Come from NACHA.

NACHA provides this resource area to educate consumers, businesses, financial institutions, and other parties about ways that they can protect themselves from the sustained and evolving phishing attacks in which individuals and organizations in the U.S. and other nations are receiving emails that fraudulently claim to come from NACHA regarding ACH payment transactions.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Danbury, Connecticut - Decades later, a Cold War secret is revealed.

"Big Bird" and it was considered the most successful space spy satellite program of the Cold War era. From 1971 to 1986 a total of 20 satellites were launched, each containing 60 miles of film and sophisticated cameras that orbited the earth snapping vast, panoramic photographs of the Soviet Union, China and other potential foes.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Hackers attack US security think-tank Stratfor, promise more targets for Christmas

LONDON - Hackers on Sunday claimed to have stolen a raft of emails and credit card data from U.S.-based security think-tank Stratfor, promising it was just the start of a weeklong Christmas-inspired assault on a long list of targets.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure