Browse Alphabetically
Browse Articles begining with the letter S
This posting will give you tips and tricks on how to start your own study group in your area. Group Dynamic is always a great motivator in your studies. You learn from others and others will benefit of your knowledge as well.
Categories: CISSP Study Group 
08.12.2015 · From admin
Last month, the popular online publication TechDirt published an article based on Golden Frog’s filing with the FCC that urged the commission to truly restore an Open Internet. A key portion of the article focuses on how we noticed that ISPs and wireless broadband providers can block encryption technologies if they desire.
Categories: Privacy 
14.11.2014 · From admin
Today is a VERY sad day. I have just learned that my good friend and confident Shon Harris has passed away. The world of information security has just lost a great lady who helped thousands in their career. She was a close friend and I will miss her greatly.
Categories: Shon Harris 
15.10.2014 · From admin
I was busy in class this week and there ware a LOT of articles published about this new bug affecting a lot of systems and devices. See this two minutes video from Norton giving you a great overview of what the attack is all about.
Categories: Zero Day Attack 
28.09.2014 · From admin
The Critical Security Controls focuses first on prioritizing security functions that are effective against the latest Advanced Targeted Threats, with a strong emphasis on "What Works" - security controls where products, processes, architectures and services are in use that have demonstrated real world effectiveness. The actions defined by the Controls are demonstrably a subset of the comprehensive catalog defined by the National Institute of Standards and Technology (NIST) SP 800-53.
12.09.2014 · From admin
As companies turn to digital technologies for business solutions, the risk of a security breach continues to rise. For the last 11 years, the security of information technology and data has been rated as a top technology initiative in surveys conducted and published by the AICPA.
Categories: Law  · SEC 
03.07.2014 · From admin
As digital technology transforms 21st century life, questions about privacy rights abound. The U.S. Supreme Court ruled on one such question in late June: if you are arrested, can the police search your cell phone without first obtaining a warrant?
Categories: Magazines (Online)  · Forensics  · Law  · Mobile Devices 
01.07.2014 · From admin
My friend Sid has some very interesting training for people who wish to learn more about Application Security.
17.06.2014 · From admin
This publication addresses the engineering-driven actions necessary for developing a more defensible and survivable information technology (IT) infrastructure
14.05.2014 · From admin
Secunia’s Vulnerability Intelligence Manager is vulnerability intelligence brought to you on time, every time, by Secunia’s renowned research team
13.05.2014 · From admin
SpiderFoot is an open source footprinting tool, available for Windows and Linux. It is written in Python and provides an easy-to-use GUI. SpiderFoot obtains a wide range of information about a target, such as web servers, netblocks, e-mail addresses and more.
Categories: FFIEC  · Footprinting 
28.04.2014 · From admin
Send ICMP Nasty Gargabe
Categories: Packet Crafting  · ICMP protocol  · ICMP attacks 
28.04.2014 · From admin
The HHS Office for Civil Rights has settled with two organizations for a combined $1,975,220 penalty after their unencrypted computers were stolen.
25.04.2014 · From admin
SANS has joined forces with industry leaders and experts to strengthen the cybersecurity of Industrial Control Systems (ICS). The initiative is equipping security professionals and control system engineers with the security awareness, work-specific knowledge, and hands-on technical skills needed
Categories: SCADA Training 
17.03.2014 · From admin
More than 7,600 different power, chemical and petrochemical plants may still be vulnerable to a handful of SCADA vulnerabilities made public this week.
Categories: SCADA and ICS systems 
16.03.2014 · From admin
Draft copy of a new book by Peter Gutman on Security Engineering
16.03.2014 · From admin
Windows 8.1 claim to stop the Pass-The-Hash attack. Smart Card’s Pass-the-Hash perils does not stop at its false sense of security.
08.03.2014 · From admin
This is Domain 6 of the Security+ CBK. It is 11% of the exam.
Categories: Security+ Online CBT 
03.03.2014 · From admin
This is Domain 5 of the Security+ CBK on Access Control and Identity Management. It is 13% of the exam.
Categories: Security+ Online CBT 
03.03.2014 · From admin
This is Domain 4 of the Security+ CBK. It is covering 10% of the exam.
Categories: Security+ Online CBT 
03.03.2014 · From admin
Per page: