Quantcast

Archive: Jul 2013

The Lifecycle of Cybercrime 2: Dissecting the Breach Process

Trustwave’s Nicholas Percoco is now shifting the focus of his keynote over to phases of the cybercrime process targeting organizations for data breaches. There are some of the other examples here that we’ll talk about, but really what I want to do is talk closely about the process. Now, these are...

The Lifecycle of Cybercrime – Nicholas Percoco and Erik Rasmussen at RSA Conference US 2013

Ethical hacker and security researcher with Trustwave Nicholas Percoco keynotes at RSA Conference 2013, addressing nuances of the present-day cybercrime. Nicholas Percoco: Thank you very much! Good afternoon! We’ll be spending the next 30 minutes or so talking about the lifecycle of cybercrime. We live...

Before, During, and After – 20 Years of DEFCON Follow-Up: Motivation Towards Checks and Balances

Gail Thackeray now turns it over to Dead Addict so that he speaks on more of a motivational side of DEFCON and relations with the law enforcement. Dead Addict: First of all I’d like to thank Jason Scott; if anyone’s looked on your DVD, there’s a good amount of material, including the issues of Tap...

Before, During, and After – 20 Years of DEFCON, or FEDCON?

Some of the pioneers of Defcon, Gail Thackeray and Dead Addict, take the floor at Defcon 20 to recall how it all started and compare it to where it is now. Gail Thackeray: Good morning, my name is Gail Thackeray and I was at DEFCON 1; I was the only prosecutor they invited to come (who would?), and my...

Jihadist Use of the Internet 2008-2011 Overview 4: Forensics and the Hierarchy of Murder

Making final strokes to the presentation, Jeff Bardin reviews more toolkits, including one on forensics, and al-Qaeda’s strategic and operational objectives. Somewhere along the line the Jihadis were able to get hold of the FBI Field Kit for forensics (see right-hand image). This was posted online on...

Jihadist Use of the Internet 2008-2011 Overview 3: Online Training Materials

Moving on with his overview of Jihadist activities on the Internet, Jeff Bardin outlines the variety of training resources available online. There are many interpretations to Jihad available online. In particular, the Salafi created their own e-books that convert those looking to become radicalized or learn...

Jihadist Use of the Internet 2008-2011 Overview 2: Cyber Jihad Methods and Tools

In here Jeff Bardin continues to highlight the Jihadist software, communication means, online guides, and dwells on the phases of radicalization process. Some of their early methods that used network security tools out there – obfuscation, denial and deception – included the distribution of Asrar...

Pleasant Password Server review

The more secure a password, the more difficult it is to remember. Even if both share a mixture of numerals, symbols, upper and lower case letters, a 20 character password is more secure than an 8 character password. While complex 8 character passwords are possible to remember if they aren’t changed...

Cyber Jihad: Jihadist Use of the Internet 2008-2011

Jeff Bardin from Treadstone 71 provides a detailed overview of the Jihadist activities on the Internet, including their software tools, online resources, etc. Good day and welcome to this cyber jihadist use of the Internet from 2008 to 2011 overview by Treadstone 71. This deck, over 60 slides, will cover...

Interview with Jay Jacobs – Part 2: Breach Detection Challenges

A follow-up on our interview where Verizon’s Jay Jacobs explains reasons for data breach detection failures, financial industry’s security problems, and more. – For the next year, are you planning to present the results in different ways, change or add segmentation? What exactly? – It’s...

Interview with Jay Jacobs, Co-Author of Verizon’s Data Breach Investigations Report

As the Principal on Verizon’s RISK team, Jay Jacobs utilizes the VERIS (Vocabulary for Event Recording and Incident Sharing) framework to collect, analyze and deliver risk data to the information security industry. He is a contributor and co-author of Verizon’s Data Breach Investigations Report series....

Investigating and Preventing Cyberbullying 6: Trust and Parental Monitoring

As the panelists move towards the end of the discussion, they are raising the issue of parent approach to their kids’ activities online. David Kirkpatrick: You know, this is a room full of people whose business is solving problems that happen online, basically. It is very interesting, and I think it’s a...

Investigating and Preventing Cyberbullying 5: Insight into Social Reporting

This part is entirely dedicated to the unique and effective reporting mechanism adopted by Facebook to mitigate cyberbullying and abuse scenarios. David Kirkpatrick: So, I want to switch gears a little bit and show you guys something as a way of leading to my next questions for Joe. So, could we have the...

Investigating and Preventing Cyberbullying 4: The Role of Empathy

The RSA panelists are looking here into the importance of showing empathy in online bullying scenarios, in particular on the bystanders’ end. David Kirkpatrick: I want to ask other panelists too about this issue of empathy, because I think almost everyone of you mentioned it as we were prepping for this....

Investigating and Preventing Cyberbullying 3: Facebook’s Perspective

What you can learn from this section is the way Facebook is dealing with the phenomenon of cyberbullying as viewed by Joe Sullivan, the Company’s CSO. David Kirkpatrick: Ok, so, Joe, what is Facebook’s general perspective on this? I mean, you, I know, think about it a lot. So how should we view Facebook...

Investigating and Preventing Cyberbullying 2: Lessons Learned from the Megan Meier Case

In this part of the panel, the participants are focusing on offline to online bullying relation as well as the notorious Megan Meier case and its consequences. David Kirkpatrick: So, Jaana, I want to jump to the other end of the road here. As a social scientist who’s spent your career studying bullying in...

Pandora’s Box Meets the Sword of Damocles: Investigating and Preventing Cyberbullying

The increasingly disturbing issue of the cyberbullying phenomenon getting discussed and analyzed by InfoSec professionals David Kirkpatrick, Sameer Hinduja, Joe Sullivan, Jaana Juvonen and Mark Krause during RSA Conference US keynote. David Kirkpatrick: Welcome back from lunch and I’m told that you’re a...

Interview with Simon Roses Femerling. Part 2

We get some further questions answered by Simon Roses with regard to the flaws of anti-theft products available on the market as well as relevant security tips. – Have you encountered spyware or malware inside legitimate anti-theft products? – None in any of the products we have examined, but it...

Busting Anti-Theft Software Myths: Interview with Simon Roses Femerling

Simon Roses holds a B.S. from Suffolk University (Boston), Postgraduate in e-Commerce from Harvard University (Boston), and an Executive MBA from IE Business School (IE, Madrid). Simon Roses is currently the CEO at VULNEX, driving security innovation. Simon is also working on a project for the DARPA Cyber...