domenica 25 marzo 2012

Best of the week - 25 marzo 2012


This week, besides the security articles, many security reports have been published. My selection of the best security resources of the week has some indications to help you to find the most relevant for your interests.

Hope you enjoy it.


@teamcymru Key highlights in the IBM X-Force 2011 Trend & Risk Report http://t.co/1L2PM5UR

@Wh1t3Rabbit Are you ready for the real #InfoSec threats? Looking beyond script kiddies to the 'determined attacker' (whitepaper) http://t.co/A6J7ctW5

@ericfreyss Online Trust Alliance (OTA) - BOTNETS http://ef7.fr/H21cIf - Code de conduite des FAI US contre les botnets (in english)

@MicrosoftDCU More from Microsoft Trustworthy Computing on U.S. ISPs committment to help protect consumers from #botnets http://t.co/dMpG96lu

@radware Amazing look inside how the $70M Trident Breach was conducted, and eventually stopped: http://bit.ly/GNcVc6 #infosec #hacker

@CND_Ltd Cybercops traced Toulouse massacre suspect through IP address http://reg.cx/1UH8 via @regvulture

@Cyberwarzonecom Hacker 0xOmar leaks Secret data from Virtual Israeli Air Force Schools http://cyberwarzone.com/cyberwarfare/hacker-0xomar-secret-data-leaked-virtual-israeli-air-force-schools #infosec #israel #0xOmar #hacking #leaked #fbi


domenica 18 marzo 2012

Best of the week - 18 marzo 2012


Another week has gone and worries about the exploiting of the MS12-020 have had a great impact on public opinion but many other interesting things have also happened.

Here you can find my selection of the best security articles of this week.

Hope you enjoy it!

@ryanaraine Microsoft confirms MAPP proof-of-concept exploit code leak
http://t.co/WP3azaeu

@e_kaspersky: 'Fileless' attacks are back. Malware uses Java exploit and leaves no traces on infected PCs http://t.co/HgoNdnik

@kaepora Canadian police wants to add a spying tax to phone bills to pay for warrantless wiretapping (not kidding):  http://t.co/hBlJNuHV

@TrendLabs “Deconstructing the Breach,” primarily covered how cybercriminals use the cloud as a means to their desired end http://bit.ly/wPIiUq #RSA

@SecurityTube [Video] Defcon 19 - How Our Browsing History Is Leaking into the Cloud http://securitytube.net/video/3003 by Securitytube_Poster

@neirajones Keeping Compliance Costs Down With Data Classification -- @DarkReading http://twb.io/vZkaXe #assetregister #risk #infosec #compliance

@FSecure Acts of war in cyberspace will likely also be war crimes, says researcher http://t.co/mtXfwj9J



domenica 11 marzo 2012

Best of the week - 11 marzo 2012

Here's my new list of the best security articles of the week.

Hope you enjoy it!

@ProfWoodward How to use you iPad securely: macworld.com/article/160313…

@sansforensics Incident Response Toolsets and Checklists - A few months ago I was reading this Digital Forensics Case Leads: ReF... twthpr.co/QdqXX

@SecurityWeek SCADA Mischief Episode 2: Context and Correlation bit.ly/zfrhd9 #SCADA #ICS #cybersecurity

@APWG Video report on Stuxnet and "the new era of warfare" fb.me/1xmSIBSsr

@Xylit0l XyliBox: POS Carding xylibox.blogspot.com/2012/03/pos-ca… #Carding

@McAfeeNews McAfee Report Exposes Contradictions in Security Perception vs. Reality: bit.ly/A6VOL5

@ebcovert3 "NIST SP 800-61 Revision 1: Computer Security Incident Handling Guide" ( bit.ly/AoDsTo )


domenica 4 marzo 2012

Best of the week - 4 marzo 2012

This has been a very interesting week for security, with the RSA Conference. And, as every Sunday morning, I'm publishing my list of the best security articles  and resources of the week.

Hope you enjoy it.

PS Since in this period I'm very busy, I can't write all the posts I would, but I hope to return to the normality as soon as possible, being able to publish at least two posts a week to treat all the subjects that I consider important.

@InfosecurityMag RSA 2012: Schneier on why Anonymous is not a group and why they’re certainly not as good as you think they are bit.ly/xMxx3f

@DamballaInc #Malware authors expand use of domain generation algorithms - #RSAC ow.ly/9mp9a

@mthorbruegge FIRST Best Practice Guide Library (BPGL) j.mp/xVtzvD < a reminder of a great source of #itsec knowledge via @teamcymru

@ArMyZ The 2011 Radware Global Application & Network #Security Report on global cyber security worldwide. radware.com/Resources/lp.a…

@CIRANEWS Looking for some weekend reading? How about the 2012 .CA Factbook, all about the Internet for Cdns: ow.ly/9cKns

@agentFin A Postmortem on the security failure of the Galactic Empire under an APT attack by/ @kellman #BSidesSF #sketchnotes pic.twitter.com/BxNs25cZ


http://www.wikio.it