Select Page

10 resolutions for New Year 2012

All of us take resolutions in the new year. What is followed and what will be left out are points of discussion beyond this post, however, most of us make resolutions. Here is a list of resolutions you can take this new year. If you hold on to it, better it is. I will...

Fallout from the Christmas Hack of Stratfor

An interesting analysis of the Stratfor hack by Richard Stiennon A cursory glance reveals the corporate email addresses and simple passwords from : Cisco:  5  employees . including a high ranking executive who used a date for his password. Juniper: Only 1...

Hackers plan space satellites to combat censorship

Computer hackers plan to take the internet beyond the reach of censors by putting their own communication satellites into orbit. The scheme was outlined at the Chaos Communication Congress in Berlin. The project’s organisers said the Hackerspace Global Grid will...

IT Risk Management

Risk Management is a key term we keep discussing every now and then when we talk about information security. It often is the closing aspect of the identified risks. Risk is the probability of a vulnerability being exploited by a threat and the resulting business...

Disk Space attacks

Disk space attacks are a form of resource utilization attacks resulting in denial of service. Disk space if a finite resource in the computers. If it is fully utilized, systems would fail in further processing the computing requests. The options available are to...