Quantcast

Archive: Jul 2012

Searching for Malware: Essence and Methodology of the Research

David Maynor and Paul Judge with Barracuda Labs give a Defcon presentation reflecting their research on malware distributed via online search resources. Dr. Paul Q. Judge (Chief Research Officer and VP at Barracuda Networks): Good afternoon, thanks for joining us for this session. I am Paul Judge, this is...

ESET Smart Security 8 review

$59.99 Outstanding usability and excellently balanced feature set make ESET Smart Security an unmistaken choice. Usability:  Features:  Efficiency:  Support:  Overall:  Download Being light on system resources and offering a commendably high degree of Internet protection are...

Bruce Schneier’s public lecture: Liars and Outliers 5. Questions and Answers

Ending his lecture at NZITF, Bruce Schneier announces the Q&A section where he answers relevant questions from the audience on the topic. I’m happy to take questions on sort of any of this, and then after that on sort of greater topics, since I know there’s a lot of things I didn’t talk about. Q:...

Bruce Schneier’s public lecture: Liars and Outliers 4. Security Gap Concept

Bruce Schneier explains the causes of security gap between e-crime and law enforcement, and makes some final points before the Q&A part of the presentation. Technology results in the balance changing. We have this balance in cooperation defectors, technology changes it somehow, and society has to...

Bruce Schneier’s public lecture: Liars and Outliers 3. Scaling of Societal Pressures

Bruce Schneier explains the variability of cooperator and defector notions depending on the society group, and outlines the issue of societal pressures scaling. And there are a lot of directions to take this research. One of the problems I had writing this book is that very quickly the topic became...

Bruce Schneier’s public lecture: Liars and Outliers 2. Societal pressures

In this part, Bruce Schneier talks about methods used by society to induce natural cooperation and minimize the number of defectors to a controllable level. Now, most of us realize that it’s our long-term interest not to succumb to our short-term interest and not to steal, or not to pay our taxes, or not...

Bruce Schneier’s public lecture: Liars and Outliers

Prominent security expert Bruce Schneier takes the floor at NZITF to present his book “Liars and Outliers”, providing in-depth analysis of how the concepts of trust and security overlap in the present-day society. Hey there! What I want to talk about today is trust and security. Basically, what...

SensiGuard review

$39.00 SensiGuard makes file protection easily manageable due to comprehensive controls and strong encryption. Usability:  Features:  Efficiency:  Support:  Overall:  Download SensiGuard by Florida based WebMinds, Inc. is encryption software delivering a decent scope of data...

The Future of Social Engineering 6: a Look into Tomorrow

Read previous: The Future of Social Engineering 5: Technology and Outsourcing Concluding her talk at DeepSec Conference, Sharon Conheady tells the audience about her most interesting real-world cases and depicts her vision of the future of social engineering. Future prospects of social engineering, plus some...

The Future of Social Engineering 5: Technology and Outsourcing

Read previous: The Future of Social Engineering 4: Tactical Research Using Social Networks Sharon Conheady speaks about hi-tech devices and applications that facilitate social engineering attacks and outlines the advantages of outsourcing services. So social networks are great, but there’s loads and loads...

The Future of Social Engineering 4: Tactical Research Using Social Networks

Read previous: The Future of Social Engineering 3: Creativity and Spear Phishing Sharon Conheady explains here how to use social networks to get to know your target, and provides some examples on how to social-engineer people using the retrieved data. Really easy social engineering with the help of social...

The Future of Social Engineering 3: Creativity and Spear Phishing

Read previous: The Future of Social Engineering 2: Nigerian and Friend scams In this part of the talk, Sharon Conheady focuses on spear phishing, outlines some aspects of social networks exploiting, and describes how social engineering attacks keep moving into a creative area. Spear phishing – very...

The Future of Social Engineering 2: Nigerian and Friend scams

Read previous: The Future of Social Engineering Proceeding with her talk, Sharon Conheady creates a historical timeline hundreds of years back to outline the origin of today’s Nigerian scams, and speaks on the prevalent present-day frauds which aim at tricking money from credulous people. So I am just...

The Future of Social Engineering

Sharon Conheady, professional social engineer from First Defense Information Security Ltd., shares her experience at DeepSec Conference, talking about the past, present and future of social engineering. My name is Sharon Conheady. I am based in London where I work as a social engineer, so I trick people, I...

Bruce Schneier: New Threats to the Internet Infrastructure 3. The Cyber War Arms Race

Bruce Schneier speaks here on the concept of cyber warfare, the way it might impact the world, and explains why cyber war rhetoric is destabilizing. Threat 3: The cyber war arms race The third threat I want to talk about is “The cyber war arms race”. And by this I don’t mean the threat of cyber...

CyberScrub Privacy Suite review

$59.95 CyberScrub Privacy Suite effectively cleans up fingerprintable traces of your sensitive activities. Usability:  Features:  Efficiency:  Support:  Overall:  Download Although the term ‘fingerprintable information’ is relatively new to the IT security sphere,...

Bruce Schneier: New Threats to the Internet Infrastructure 2. Regulations from Law Enforcement

Continuing his presentation on nontrivial threats to the online world, Bruce Schneier talks about regulations pushed by law enforcement and big companies affecting users’ privacy. Threat 2: Ill-conceived regulations from law enforcement The second risk I want to talk about is from government. And I titled...

Panda Antivirus Pro 2014 review

$49.99 Panda Antivirus Pro features robust security architecture and delivers dependable protection for everyday use. Usability:  Features:  Efficiency:  Support:  Overall:  Buy Now The first and major thing to outline in terms of analyzing Panda Antivirus Pro software is the...

Bruce Schneier: New Threats to the Internet Infrastructure

The famous computer security specialist, cryptographer, founder and CTO of ‘BT Managed Security Solutions’ Bruce Schneier delivers a talk at RSA Conference 2012 where he expresses his non-standard viewpoint on today’s major risks in the Internet. Hi! Today I would like to talk about risks to...

Human Hacking Exposed 3: Security Updates, Scripts and Company Audits

Read previous: Human Hacking Exposed 2: Identifying Social Engineering Attacks Moving on with his RSA Conference talk on human hacking, Chris Hadnagy provides several more tips pertaining to importance of software and security updates, implementation of scripts for specific situations, and usefulness of...

Human Hacking Exposed 2: Identifying Social Engineering Attacks

Read previous: Human Hacking Exposed: Preventative Tips That Can Save Your Company This part of the presentation encompasses Chris Hadnagy’s first three preventative tips to identify social engineering attacks and be cautious about sensitive company information that employees possess. So these six tips...

Human Hacking Exposed: Preventative Tips That Can Save Your Company

‘White Hat Defense’ CEO and popular podcaster Chris Hadnagy speaks at RSA Conference on how the bad side of social engineering may affect your company. Here today I will talk to you about human hacking exposed – 6 preventative tips that can save your company. A little bit about me. My name is...

Using the Internet as an Investigative Tool 6: Conclusion

Read previous: Using the Internet as an Investigative Tool 5: People Search Services The final part of Lance Hawk’s InfoSec World presentation encompasses details on visualizers, IP address tracking, geolocation; and contains a brief summary of the subject matter. Other investigative sites (see image) –...

Using the Internet as an Investigative Tool 5: People Search Services

Read previous: Using the Internet as an Investigative Tool 4: Searching Blogs and Wikis A number of Twitter services and various people search tools are the investigative instruments Lance Hawk tells about in this part of his narration. Searching Tweets Now, searching Tweets. We have Twitter itself,...

Using the Internet as an Investigative Tool 4: Searching Blogs and Wikis

Read previous: Using the Internet as an Investigative Tool 3: Meta Search Engines and Translation Tools Lance’s primary focus in this part is blog searching services that might come in handy while conducting investigative research, as well as using Wiki-type sites to retrieve sensitive...

Using the Internet as an Investigative Tool 3: Meta Search Engines and Translation Tools

Read previous: Using the Internet as an Investigative Tool 2: Google Services In this part of the presentation, Lance Hawk specifies the features of meta search engines, speaks on utilizing Bing within the investigative framework, and outlines peculiarities of online language translation services. Using Bing...

Using the Internet as an Investigative Tool 2: Google Services

Read previous: Using the Internet as an Investigative Tool Lance Hawk speaks here on specific data acquisition and authentication software that helps document the findings, and outlines the role of Google services in facilitating investigative research. Tools to Document Findings Okay, what are the general...

Using the Internet as an Investigative Tool

Lance P. Hawk, Manager of Computer Forensics and Investigations at ‘Air Products and Chemicals, Inc.’, takes the floor at InfoSec World conference to deliver an instructive presentation on how in-depth forensic analysis and tracking can be conducted using a variety of web-based techniques and...

Why Internet users cannot completely trust digital certificates

F-Secure’s representatives Mikko Hypponen and Sean Sullivan discuss the present-day issues with code signing and SSL certificates trustworthiness, and get into details of the notorious Comodogate hack. There are lots security things that we can talk about: well, the RSA hack, a bit earlier the HBGary...