Information Security News
Aviation Info Sec
Infosecurity Magazine (blog)
Information Risk Management Plc. (IRM) is an international Information Security consultancy dedicated to providing strategic cybersecurity advice across a wide range of sectors to ensure that executives, management and technical teams understand the ...
The August 2013 ISSA Journal includes an excellent read from Ken Dunham: A Fuzzy Future in Malware Research. Ken is a SANS veteran (GCFA Gold, GREM Gold, GCIH Gold, GSEC, GCIA) who spends a good bit of his time researching, writing and presenting on malware-related topics.
From Ken's abstract:
"Traditional static analysis and identification measures for malware are changing, including the use of fuzzy hashes which offers a new way to find possible related malware samples on a computer or network. Fuzzy hashes were born out of anti-spam research and offer another avenue of promise for malware researchers and first responders. The focus of this article is on malware research and response."
No discussion on fuzzy hashes is complete without including SANS Instructor Jesse Kornblum's SSDEEP, as Ken does in depth. Consider it a requirement to familiarize (pg. 22) yourself with SSDEEP if conducting research of this kind interests you.
Enjoy this great read and happy fuzzy hashing!
by Dr Dre Beats UK
by Bev Morris
Can someone answer me this.. How do I get my hacked facebook back? Facebook are no use, they won't help me..
CounterTack Partners With South Korean Providers For APT Defense
SK Infosec, the leading information security company in South Korea, has received 2013 Frost & Sullivan Korea Excellence Awards for Managed Security Services. The company has more than 3,000 customers in Korean government and public institutions, ...
IT security strategy 2.0: Adjusting for a shifting infosec landscape
There is no doubt that we as information security practitioners face unprecedented infosec challenges, ranging from the highly technical malware injections to simple social engineering attacks, that require creative energy to address. Each day we read ...
Posted by InfoSec News on Aug 22http://english.peopledaily.com.cn/90786/8373519.html
Posted by InfoSec News on Aug 22http://www.fastcompany.com/3016156/the-code-war/data-triage-for-the-boston-bombing-how-beth-israel-deaconess-protected-patient-
Posted by InfoSec News on Aug 22http://www.theregister.co.uk/2013/08/21/cyberheist_ddos_smokescreen/
Posted by InfoSec News on Aug 22http://www.spiegel.de/international/zeitgeist/man-in-underpants-partied-in-german-government-jet-for-angela-merkel-a-917494.html
Posted by InfoSec News on Aug 22http://fcw.com/articles/2013/08/21/veterans-affairs-data-breaches.aspx