-
Information gathering tool
Social networks sites have become a potential source of information about criminals and their activities. Many private firms are tracking their employees lies using those shared environment. Security researchers have created the rapid information overlay technology (riot). The tool can gather a lot of information from websites such as Facebook, twitter and Foursquare. Riot can […]
-
Interesting security reads of the week
February 06, 2013 : China and hacking http://tinyurl.com/be9a79f Twitter acknowledged the compromise of 250 000 accounts http://tinyurl.com/am87n9s At least James Bond should have alerted the CIA http://goo.gl/z0RRW
-
A Standard for Incident response
Businesses are using the latest protection for their Infrastructure but are still facing threats. Once the breach has been discovered there are many steps to follow in order to keep the continuity of the operations, this process is called Incident response. Incident response is the set of actions and rules to follow in front of […]
-
Cloud Computing Security
National Institute of standard and technology has defined Cloud computing as ”a model for enabling ubiquitous,convenient,on-demand network access to a shared pool of configurable computing resources(e.g. networks,servers,storage,applications and services.) that can be rapidly provisioned and released with minimal management effort or service provider interaction”. The service model consists of Infrastructure as a service (Iaas),Platform as […]
-
A small Look at FLAME , SKYWIPER
The security community has been tuned this week with the discovery of a new malware, Flame. It is a cyber weapon from the same family with Stuxnet and Duqu. Flame is a backdoor with 3000 lines of codes making it too difficult to be analyzed. It is a backdoor , a Trojan with worm capabilities. […]
-
Typosquatting and Doppelganger
Typosquatting is the typographical error made by internet users when inputting a web address into a browser. As a result, the URL request is redirected to the domain that mimics the one the user really wants to access. Then appears the so called doppelganger domains, which are spelled identical to the legitimate domains but differ […]
-
A look at a phishing attempt
I got this when opening my msn email account. But Fortunately for me, the site has been locked .