Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

The Modern History of Cyber Warfare

This article reflects the lecture for CIS5930/CIS4930 “Offensive Security” at the Florida State University, covering some of the events that compose the history of what’s called “cyber warfare”. Today’s lecture is about that term: cyber warfare, the history of it, the public...

The Lifecycle of Cybercrime 5: Public-Private Partnerships as a Countermeasure

Now Erik Rasmussen takes some time to talk about the US Secret Service’s achievements and the role of public-private partnerships in fighting cybercrime. Nicholas Percoco: Now I’d like to have you spend a couple of minutes talking about some of the successes your organization has had. We spoke a lot...

The Lifecycle of Cybercrime 4: Perspective of the Secret Service

Now Nicholas Percoco invites Erik Rasmussen from the US Secret Service to join the discussion of cybercrime and answer questions from the community. Nicholas Percoco: So, now what we’re going to do is we’re going to bring out a special guest, somebody I’ve been working with for a long period of time,...

The Lifecycle of Cybercrime 3: Demos of Exploit-Based Data Theft

In this part of the keynote Nicholas Percoco demonstrates the flow of a typical personal data harvesting attack based on the use of common exploits. Now what I want to do is change gears a little bit. We talked about the major methods of attack, and so I want to share with you a little bit of an attack demo....

The Lifecycle of Cybercrime 2: Dissecting the Breach Process

Trustwave’s Nicholas Percoco is now shifting the focus of his keynote over to phases of the cybercrime process targeting organizations for data breaches. There are some of the other examples here that we’ll talk about, but really what I want to do is talk closely about the process. Now, these are...

The Lifecycle of Cybercrime – Nicholas Percoco and Erik Rasmussen at RSA Conference US 2013

Ethical hacker and security researcher with Trustwave Nicholas Percoco keynotes at RSA Conference 2013, addressing nuances of the present-day cybercrime. Nicholas Percoco: Thank you very much! Good afternoon! We’ll be spending the next 30 minutes or so talking about the lifecycle of cybercrime. We live...

Before, During, and After – 20 Years of DEFCON Follow-Up: Motivation Towards Checks and Balances

Gail Thackeray now turns it over to Dead Addict so that he speaks on more of a motivational side of DEFCON and relations with the law enforcement. Dead Addict: First of all I’d like to thank Jason Scott; if anyone’s looked on your DVD, there’s a good amount of material, including the issues of Tap...

Before, During, and After – 20 Years of DEFCON, or FEDCON?

Some of the pioneers of Defcon, Gail Thackeray and Dead Addict, take the floor at Defcon 20 to recall how it all started and compare it to where it is now. Gail Thackeray: Good morning, my name is Gail Thackeray and I was at DEFCON 1; I was the only prosecutor they invited to come (who would?), and my...

Jihadist Use of the Internet 2008-2011 Overview 4: Forensics and the Hierarchy of Murder

Making final strokes to the presentation, Jeff Bardin reviews more toolkits, including one on forensics, and al-Qaeda’s strategic and operational objectives. Somewhere along the line the Jihadis were able to get hold of the FBI Field Kit for forensics (see right-hand image). This was posted online on...

Jihadist Use of the Internet 2008-2011 Overview 3: Online Training Materials

Moving on with his overview of Jihadist activities on the Internet, Jeff Bardin outlines the variety of training resources available online. There are many interpretations to Jihad available online. In particular, the Salafi created their own e-books that convert those looking to become radicalized or learn...