by Binoy KL | Feb 19, 2011 | Security Tools
The Cyber Security Evaluation Tool (CSET) provides users with a systematic and repeatable approach for assessing the cyber security posture of their industrial control system networks. This tool also includes both high-level and detailed...
by Binoy KL | Feb 12, 2011 | Corporate Security, Cyber Warfare
I have been going thru the McAfee blog on the Night Dragon attacks on the global energy sector which identified as started in November 2009. The summary of the white paper released by them on this topics includes some key elements: The coordinated covert and targeted...
by Binoy KL | Feb 10, 2011 | PCI DSS Compliance, Security News
A Russian hacker received a five-year suspended sentence on Tuesday after pleading guilty to playing a key part in the robbery of $10m from RBS WorldPay in November 2008. Yevgeny Anikin, 27, served as the “software specialist” in a cybercrime ring...
by Binoy KL | Feb 10, 2011 | Reports & Whitepapers
The fifth edition of the Hack in the Box is available for download. This issue discusses about Secure Shell Attack, Exploting web virtual hosting, Windows CSRSS etc… The direct link to the PDF s here
by Binoy KL | Feb 9, 2011 | Reports & Whitepapers, Security News
In connection with the Safer Internet Day on 8 February 2011, Eurostat, the statistical office of the European Union, presents a selection of statistics concerning internet security. The Safer Internet Day is part of a global drive to promote a safer...
Recent Comments