by Binoy KL | Mar 18, 2008 | Cyber Attacks
Sid Stamm, Zulfikar Ramzan, and Markus Jakobsson have identified a clever, and potentially devastating, attack against home/wireless routers. How does the attack works? Attacker creates a webpage with containing the malicious Javascript code. Victim visits the page...
by Binoy KL | Mar 3, 2008 | Cyber Security
This article is going to focus on an overall information security management system. This is in line with industry best practices like ISO27001, COBIT, SSE-CMM and legislative requirements like HIPAA, SAS70 etc. To help organizations in kick starting the information...