InfoSecMash.com

22 Flips | 1 Magazine | 18 Followers | @infosec | Keep up with InfoSecMash.com on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “InfoSecMash.com”

One Reason Security Is So Hard? Really Bad Reports.

Security is hard. Everyone knows that. The question is: why?<p>After all, our understanding of cyber threats improves with each day. The tools we use to …

Usability

vSkymmer botnet, a financial malware appears in the underground

The principal reports proposed by various security firm demonstrate a sustained growth of cyber criminal activities fueled by increased offer of …

Cyber Attack shuts down Election Commission of Pakistan website

The Election Commission of Pakistan(ECP) website reportedly suffered cyber attacks - Pakistan Government temporarily shuts down the www.ecp.gov.pk to …

Employment Opportunity with Guardian Digital Forensics

We are currently seeking applicants for either a Digital Forensics Examiner or Digital Forensics Technician position. Our requirements: Digital …

A Digital Forensics Innocence Project

Image via WikipediaJoe Windish posted an article on the need for a computer forensics innocence project. For A Computer Forensics Innocence Project …

Experts and Expertise

Cindy Murphy wrote an excellent blog post over at the CDFS (Consortium for Digital Forensics Specialists) blog titled, "Experts and Expertise" on the …

A Brief History of Time : Forensic Time

Time. It is so embedded in our lives that we cannot even think without thinking of it as it forms the context within which we live. And it would be …

Cyber Security Resource Library | Carbon Black

Carbon Black offers a wide selection of cyber security resources including videos, webinars, training materials, industry news, guides, and more.

Casey Anthony - Detectives Miss Google Searches

Apparently, this is the case that will never be resolved, in spite of the fact that the case has been tried and the defendant acquitted. …

Security Monitoring News, Analysis, Discussion, Community

News & Commentary<p>Commentary<p>Four barriers to automation and how to overcome them.<p>By Dan Koloski Vice President, Oracle's Systems Management and …

Getting a Handle on the Scale of Modern Malware

<b>Security Evasion and Customized Malware Has Become Mainstream for Attackers of all Skill Levels...</b><p>Targeted, custom and polymorphic malware is …

Cybersecurity

China Women Dating

If you’ve read my blog for a while you know I’ve been to China a few times, conducting research, doing interviews, giving the occasional speech and …

A Facebook phone: Is this the final brick in the social network’s walled garden?

Looks like it’s that time of year again — the time when rumors of a “Facebook phone” pop up like tulips after a spring rainstorm. This time around, …

Understanding CAPTCHA-Solving Services in an Economic Context 5: Do CAPTCHAs Actually Work? | Privacy PC

<i>Delving into human solver backends and moving on to the summary, Marti Motoyama provides retrieved statistics and draws general conclusions on the</i> …

IT security

“We apologise for the previous apology” – NZ gov dept in email CC: double-blunder

When you send an email to a group of recipients who don’t already know each other, you use <b>BCC:</b>.<p>Don’t you?<p>Let us quickly revise why.<p>The users in the …