Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Satellite Turla

September 17, 2015 by Marc Handelman in All is Information, Espionage, Space Based Attack Vector
September 17, 2015 /Marc Handelman /Source
All is Information, Espionage, Space Based Attack Vector

McRee's Visualizing Network Data With Network Data

September 17, 2015 by Marc Handelman in All is Information, Information Security, Network Security, Security Research, Security Tooling, Visualization

Russ McRee's well-wrought piece published on his highly respected HolisticInfosec site, within his toolsmith column (both on his site and formerly in the ISSA Magazine) provides a tour-de-force primer on utilizing the R Development Environment. R in this case, is bent to Russ's will to accurately depict (of course) network data (in this case generated by (and in Russ's words) - "network traffic packet capture specific to malware called Win32/Sirefef or ZeroAccess that uses stealth to hide its presence on victim systems". Today's Must Read.

September 17, 2015 /Marc Handelman /Source
All is Information, Information Security, Network Security, Security Research, Security Tooling, Visualization

Blackhat 2015, Peculiarities of Nation-State Malware Research

September 16, 2015 by Marc Handelman in Information Security, Espionage, All is Information, Malware, Research, Security Research
September 16, 2015 /Marc Handelman /Source
Information Security, Espionage, All is Information, Malware, Research, Security Research

Espionage, The Intelligence Files

September 16, 2015 by Marc Handelman in All is Information, Espionage, Information Security, Security Heal Thyself

News, via Lucian Constantin, writing at PCWorld, details the discovery of a targeted group of LinkedIn Corporation (NasdaqGS: LNKD) users (in this case information security professionals) unwittingly involved in a focused intelligence/espionage campaign to garner discrete corporate information. Another case of social networks as the baseline method for intelligence gathering by nations-states and illicit non-governmental organizations. Aye me buckos! A treasure-trove thee awaits!

September 16, 2015 /Marc Handelman
All is Information, Espionage, Information Security, Security Heal Thyself

Software Security Assurance

September 14, 2015 by Marc Handelman in All is Information, Information Security
September 14, 2015 /Marc Handelman /Source
All is Information, Information Security

Microsoft Phones Home →

September 14, 2015 by Marc Handelman in All is Information, Information Security, Demise of Privacy, Blatant Stupidity

In a well researched and written piece, Chris Hoffman, writing at How-To Geek, reveals at least thirty methods of data collection Microsoft Coporation (NasdsaqGS: MSFT) uses within Windows 10, violating any rational persons' sense of privacy. Is it time for the Federal Trade Commission to step in and investigate this travesty? You be the judge (after all, it's your privacy that's being violated).

September 14, 2015 /Marc Handelman
All is Information, Information Security, Demise of Privacy, Blatant Stupidity

Ad-Block, and Why You Should Too... →

September 11, 2015 by Marc Handelman in All is Information, Information Security, Vulnerabilities, Malicious Advertising

via the eponymous Darren Pauli, comes this tell-all of poisoned Google Inc. (NasdaqGS: GOOG) and Yahoo! (NasdaqGS: YHOO) advertising.

September 11, 2015 /Marc Handelman
All is Information, Information Security, Vulnerabilities, Malicious Advertising

Zen and the Art of Information Security →

September 10, 2015 by Marc Handelman in All is Information, Education, Information Security
September 10, 2015 /Marc Handelman
All is Information, Education, Information Security

Les Fuites de Données Rapport de la Journée →

September 10, 2015 by Marc Handelman in All is Information, Data Driven Security, Data Loss Prevention, Leakage, Information Security

aka Data Leakage Report of the Day...

John Leyden, writing at El Reg, scribes a stupefyingly scary report, detailing misconfigurations in application deployment and implementation of so-called Big Data systems which are leaking vast amounts (reports of a petabyte are floating about) of data.

September 10, 2015 /Marc Handelman
All is Information, Data Driven Security, Data Loss Prevention, Leakage, Information Security

Apparently, Data Never Sleeps... →

September 09, 2015 by Marc Handelman in All is Information
September 09, 2015 /Marc Handelman
All is Information

The Majority Compromised →

September 09, 2015 by Marc Handelman in Database Security, Blatant Stupidity, All is Information, Health Care Security, Information Security

Lucas Mearian, writing at ComputerWorld, regales us with the astounding truth: The majority of health care providers and health plans/insurers have been compromised.

All of that is compounded by the same companies transfering risk, in the vainglorius hope they are better off for it.

September 09, 2015 /Marc Handelman
Database Security, Blatant Stupidity, All is Information, Health Care Security, Information Security

Bartletts' Dark Net →

September 08, 2015 by Marc Handelman in All is Information, Dark Web, Dark Net
September 08, 2015 /Marc Handelman
All is Information, Dark Web, Dark Net

Internet of the Broken

September 08, 2015 by Marc Handelman in All is Information, Internet
September 08, 2015 /Marc Handelman
All is Information, Internet

On SAML, The Breaking

September 04, 2015 by Marc Handelman in All is Information, Education, Information Security, SAML
September 04, 2015 /Marc Handelman
All is Information, Education, Information Security, SAML

On SAML, The Chalk Talk →

September 04, 2015 by Marc Handelman in All is Information, Information Security, SAML
September 04, 2015 /Marc Handelman
All is Information, Information Security, SAML

Quantum Biology, The Weirding →

September 03, 2015 by Marc Handelman in All is Information, Quantum Effects, Quantum Mathematics, Quantum Mechanics, Question Everything, Science, Education
September 03, 2015 /Marc Handelman
All is Information, Quantum Effects, Quantum Mathematics, Quantum Mechanics, Question Everything, Science, Education

Identity Management: Building a Global Identity Ecosystem Part 5 →

September 02, 2015 by Marc Handelman in All is Information, Identity Management, Information Security
September 02, 2015 /Marc Handelman
All is Information, Identity Management, Information Security

Insiders Are The Greatest Threat, The FAA Aurora Radar Center Story →

September 02, 2015 by Marc Handelman in All is Information, Physical Security

The litany of the United States Department of Transportation Federal Aviation Administration's Chicago Air Route Traffic Control Center in Aurora, Illinois (containing new, interesting factoids released by Prosecutors), via the superlative reportage of Jason Meisner at the Chicago Tribune. In which, one can deduce the simple, unfortunate truth: Insiders Are The Greatest Threat...

September 02, 2015 /Marc Handelman
All is Information, Physical Security

Identity Management: Entities and Entitlement Part 4 →

September 01, 2015 by Marc Handelman in All is Information, Information Security, Identity Management
September 01, 2015 /Marc Handelman
All is Information, Information Security, Identity Management

Device Enrcyption, A Guide →

September 01, 2015 by Marc Handelman in All is Information, Cryptography, Encryption, Information Security

In a well-engineered screed, targeting both laptop and phone encryption modalities, Andrew Cunningham writing at Ars Technica's gadget section provides us with a tell-all discussion of how, in fact, to protect thyself from the evil that lurketh without. Today's Must Read.

September 01, 2015 /Marc Handelman
All is Information, Cryptography, Encryption, Information Security
  • Newer
  • Older