Daily Archive: April 20, 2012
For the most part, we all know what NOT to do when it comes to security best practices.
“Certificate authorities (CAs) are critical links in the chain that ensures the quality and integrity of enterprise IT security, compliance and operations. CAs issue and ensure valuable third-party trust for human-to-machine and machine-to-machine communications and authentication. However, leveraging the security benefits of trust providers like CAs doesn't relieve your organization of its management responsibilities….”
“A massive hacker attack has crippled an overseas website that has reported extensively on China's biggest political turmoil in years, underscoring the pivotal role the Internet has played in the unfolding scandal. North Carolina-based Boxun
“Joshua Corman wrote a post entitled HD Moores Law in which he raises some valid points around the fact that tools like Metasploit make it incredibly easy for anyone with little or no knowledge to be able to test a system for vulnerabilities. Naturally, the purpose of this or other such tools is to aid a security tester in finding these vulnerabilities. However, like any such tool, you cannot dictate if someone will use this for attack or defensive purposes….”
“Today I desire to share with you the results of a study by security firm Trend Micro which is focused on mobile threat incidents related to the first quarter of 2012. The large diffusion of mobile devices and the lack of awareness of principal cyber threats have produced an increasing interest by cybercriminals in the mobility sector, and the Android platform is the most targeted with over 5000 new malicious apps.