securitycrunch

67 Flips | 1 Magazine | 4 Followers | @securitycrunch | Keep up with securitycrunch on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “securitycrunch”

Basic Malware Cleaning

Last year in September I wrote an article for Hakin9 on how to detect, identify and of course disinfect a machine from malware.<br>I've decided to …

Vobfus Worm, Beebone Trojan Create Malware Infection Loop

It’s often difficult to say what came first. This is certainly the case when it comes to recent interactions between the Vobfus worm and Beebone …

Three types of online attack

Cybercrime expert Mikko Hypponen talks us through three types of online attack on our privacy and data -- and only two are considered crimes. "Do we …

Starting A Career in Digital Forensics: Part 2

There is clearly a difference in the type of investigations and examinations being performed versus what are encountered in the public sector. The …

Targeted Attacks Video Series

Many of the CISOs I talk to tell me that “Advanced Persistent Threats” (APT) style attacks are among their top concerns. As I have written about …

Gartner's mind-blowing digital marketing transit map - Chief Marketing Technologist

In the competition for the best visualization of the kaleidescopic marketing technology space — other entries include my marketing technology …

RT @sm: Love this map showing the most famous brand from each state http://t.co/nezNlnbl5P

Archive

I think there are two “schools” when it comes to scripted event direction in video games. People who move into this role from animation or art …

Former Facebook Security Chief Joined NSA in 2010

In another twist in what was already a complicated story about Facebook’s involvement in the National Security Agency’s PRISM wiretapping technology, …

NSA fears spark traffic surge on DuckDuckGo search engine

Media coverage of the US National Security Agency's Prism electronic surveillance program, as well as wider publicity for online privacy issues, is …

IIS Crypto

IIS Crypto is a free tool that gives administrators the ability to enable or disable protocols, ciphers, hashes and key exchange algorithms on …

Sign of the Times: N.S.A. Notices Arrive in Hollywood

These posters started appearing on the streets of Los Angeles Thursday morning. This one was at the corner of La Brea and Melrose Avenues, not far from Hollywood.<p>The telephone number will connect you with the National Security Agency’s Chief Public Liaison Officer for the Freedom of Information …

State of the Hack: M-Trends® 2013 - Grady Summers

Foreign workers queue to quit Saudi Arabia

<b>Riyadh:</b> Tens of thousands of foreign workers are trying to leave Saudi Arabia after the government of the world's No. 1 oil exporter said they would …

Introduction to Manual Explorer in IBM Security AppScan Enterprise 8.7

Faster, FIPS PUB 140-2 compliant, and browser friendly<p>Guang Dong Li and Hui Ting Wang<br>Published on May 21, 2013<p>IBM Security AppScan Enterprise Edition …

US prosecutes '$6bn money-laundering hub'

<b>The Liberty Reserve digital money service that was shut down laundered more than $6bn (£4bn) in criminal cash, US authorities have said.</b><p>Weekend police raids in 17 countries scooped up Liberty Reserve's owners, operators and its computer hardware.<p>The Department of Justice said it was the "largest …

2013 digital forensic tools

Confirmed: US government records ALL private telephone calls

(NaturalNews) There is no such thing as privacy in America anymore, as evidenced by the fact that our own government violates the Constitution's …

Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”

For Ars, three crackers have at 16,000+ hashed passcodes—with 90 percent success.<p>In March, readers followed along as Nate Anderson, Ars deputy editor …

What Every Database Administrator Should Know About Security

Database administrators and security people are often at odds with each other. Here are some ways they can get together<p><i>[The following is excerpted</i> …

Is It Worth the Time?

How long can you work on making a routine task more efficient before you're spending more time than you save? (Across five years) [[A table, with the …

6 Secrets to Better Networking at Conferences

In March 2009, at the SXSW conference in Austin, Texas, I attended dozens of sessions and parties and and met hundreds of people. But it was a chance …

Watering hole attacks and exploit kits - Indian gov site case

Number of Watering hole attacks is increasing, most of them based on well known exploit kits. The case of compromised Indian gov Web site leads to …

Facebook Page Manager App Leaks Private Photos, a Fix Is on the Way

<b>Facebook has to run a fine line between getting people to share more and respecting their privacy. Sometimes it manages to strike a balance,</b> …

Deconstructing Google's Strategy: Will Google Eat Your Business Next?

After Google’s I/O announcements, I flashed back to a dozen or so conversations I’ve had with executives and entrepreneurs about <b>what</b> Google is doing. Reading between the lines, some imagined buying yachts after a Google acquisition. Others feared downgrading to an inner tube if Google entered their …