Information Security News
The practicality of the Cyber Kill Chain approach to security
October 04, 2013 — If you're one of those folks who read a lot of InfoSec news, you've no doubt heard a lot of mention of the effectiveness of a Cyber Kill Chain approach to security. If you managed to miss the hubbub, you may be wondering if that's ...
Der Bankenkenner Bruno Schnarwiler neu bei der Swiss Infosec AG
Mit der Verpflichtung des eidg. dipl. Wirtschaftsinformatikers Bruno Schnarwiler setzt die Swiss Infosec AG die weitere Spezialisierung in ihren Reihen fort. Schnarwiler hat sich im Bankensektor als Leiter Sicherheit und Leiter Operationelle Risiken ...
Swiss Infosec holt Risk-Manager einer Bank
The National Security Agency and its UK counterpart have made repeated and determined attempts to identify people using the Tor anonymity service, but the fundamental security remains intact, as top-secret documents published on Friday revealed.
The classified memos and training manuals—which were leaked by former NSA contractor Edward Snowden and reported by The Guardian, show that the NSA and the UK-based Government Communications Headquarters (GCHQ) are able to bypass Tor protections, but only against select targets and often with considerable effort. Indeed, one presentation slide grudgingly hailed Tor as "the king of high-secure, low-latency Internet anonymity." Another, titled "Tor Stinks," lamented: "We will never be able to de-anonymize all Tor users all the time."
The documents go on to reveal a panoply of covert technologies with names like FoxAcid, Quantum, Stormbrew, Fairview, and Turbulence. The goal of some is to exploit software bugs in the Firefox browser and other software applications used by individual Tor users. Another program uses Tor servers operated by the NSA to redirect user requests or spot patterns in Internet traffic that enters or exits the Tor network. NSA and GCHQ agents also discussed efforts to "shape" or influence future developments of the Tor software and network.
by louis vuitton outlet store
by mulberry sale
Posted by InfoSec News on Oct 04http://www.cbronline.com/news/tech/software/malware/silent-circles-cyber-security-and-privacy-issues-around-the-world
Posted by InfoSec News on Oct 04http://www.cbsnews.com/8301-250_162-57605564/obamacare-marketplaces-raise-data-security-concerns/
Posted by InfoSec News on Oct 04http://www.batemanbanter.com/2013/10/defcon-survey-hackers-want-more-crypto-less-nsa/
Posted by InfoSec News on Oct 04http://www.washingtontimes.com/news/2013/oct/3/cyber-mass-shooter-poses-future-threat-computer-se/
Posted by InfoSec News on Oct 04http://krebsonsecurity.com/2013/10/adobe-to-announce-source-code-customer-data-breach/