Weekend Reading
Anatomy of a Red Team Attack
A Red Team test involves an all-out attempt to covertly gain access to a company’s critical plant control systems, using both cyber and physical means. These guys haven’t failed yet, and they’ve never been caught. Here’s a close-up look at how they do it.
These men could have been bad guys, intent on doing harm. Thankfully, however, they were only posing as bad guys—members of an industrial “Red Team” hired by the plant’s owner. The team’s mission: to covertly gain access to the plant’s critical control systems, using whatever means necessary, short of doing any harm.
Take a look HERE.
==================================================================
Are Computer "Glitches" Ruining your Life?
The term "computer dependency" is often used to describe so-called "Internet addiction," or the excessive use of personal PCs by individuals who spend a great deal of their time online. However, there's another kind of computer dependency that we, as a society, all suffer from today. That's the ever- increasing dependency of all our essential systems, from public utility services to privately operated companies, on computers. Most of these would no longer be able to function at all if their computers went down.
Take a look HERE.
==================================================================
Murder, She Texted : Wireless Messaging Used to Fight Crime
Three weeks ago, when police in The Hague in the Netherlands got a report that a boat had been stolen, they sent out a text message about the case to residents who had signed up to receive neighborhood crime alerts on their cellphones.
An hour later, a woman bicycling along a canal who got the message notified police via a phone call that she saw a boat that met the description. The boat was found and the thief arrested. "They're the eyes on the street," says a spokesperson for The Hague's police department.
Take a look HERE.
==================================================================
Is securing your network worth the money?
We often hear corporate IT pros complain that justifying security expenses is tough because they don’t necessarily generate revenue or enable new business opportunities. In fact, figuring out the economics of IT security is so challenging for customers and vendors that lots of the world’s best researchers are putting their minds to the task. They recently shared results at a conference hosted by Carnegie Mellon University.
Take a look HERE.
==================================================================
Top 10 geek vacations - Part I
What makes a great geek vacation? Well, high-speed access from even the most obscure locale is a given. Then throw in some activities to stimulate the brain cells, maybe a dose of electronic entertainment, possibly a bit of techie history, and you’re most of the way there. Of course, it also helps if your chosen location is frequented by similarly techie folks and has some out-of-the-mainstream cred, meaning it would make your non-alpha geek friends roll their eyes.
Take a look HERE.
==================================================================
Ebuyer.com runs on a Commodore 64
Online retailing can be a rough sport. The competition is rabid, customer loyalty is fickle, and IT expenses can go through the roof. That's why The Register can appreciate an e-tailer with a unique business model. A hawk-eyed El Reg reader points out that UK online retailer Ebuyer.com appears to be cutting costs by running its site on servers dating back to the late Cretaceous period - roughly speaking. According to internet monitoring company Netcraft, the e-tailer has bypassed run-of-the-mill legacy servers for some serious heirlooms.
Take a look HERE.
==================================================================
Microsoft tries evading new GPL grasp
Microsoft on Thursday took steps to avoid entanglement with a new version of the General Public License, the most widely used license in the free and open-source software domain. The company long has objected to the GPL and generally prefers its secretive, proprietary software development practice. But a November partnership with Linux seller Novell, under which Microsoft sells certificates entitling customers to Novell's Suse Linux Enterprise Server support subscriptions and guarantees it won't sue those customers for patent infringement, brought Microsoft into closer contact with the GPL.
Take a look HERE.
==================================================================
Inside the Mind of a Hacker
During the 2004 presidential campaign, Jeremy Poteet watched as the candidate's site he had worked to secure went up. Just 16 minutes later, the site was attacked.
But this high-profile site deftly deflected these attacks and the others that followed because Poteet had anticipated—and then protected against—the kinds of exploits he knew would be coming. How did he know? Quite simply, he's a hacker, and thinking like a hacker—and getting to know the tools that hackers use—is one of the most effective ways to protect your company from being exploited.
Take a look HERE.
A Red Team test involves an all-out attempt to covertly gain access to a company’s critical plant control systems, using both cyber and physical means. These guys haven’t failed yet, and they’ve never been caught. Here’s a close-up look at how they do it.
These men could have been bad guys, intent on doing harm. Thankfully, however, they were only posing as bad guys—members of an industrial “Red Team” hired by the plant’s owner. The team’s mission: to covertly gain access to the plant’s critical control systems, using whatever means necessary, short of doing any harm.
Take a look HERE.
==================================================================
Are Computer "Glitches" Ruining your Life?
The term "computer dependency" is often used to describe so-called "Internet addiction," or the excessive use of personal PCs by individuals who spend a great deal of their time online. However, there's another kind of computer dependency that we, as a society, all suffer from today. That's the ever- increasing dependency of all our essential systems, from public utility services to privately operated companies, on computers. Most of these would no longer be able to function at all if their computers went down.
Take a look HERE.
==================================================================
Murder, She Texted : Wireless Messaging Used to Fight Crime
Three weeks ago, when police in The Hague in the Netherlands got a report that a boat had been stolen, they sent out a text message about the case to residents who had signed up to receive neighborhood crime alerts on their cellphones.
An hour later, a woman bicycling along a canal who got the message notified police via a phone call that she saw a boat that met the description. The boat was found and the thief arrested. "They're the eyes on the street," says a spokesperson for The Hague's police department.
Take a look HERE.
==================================================================
Is securing your network worth the money?
We often hear corporate IT pros complain that justifying security expenses is tough because they don’t necessarily generate revenue or enable new business opportunities. In fact, figuring out the economics of IT security is so challenging for customers and vendors that lots of the world’s best researchers are putting their minds to the task. They recently shared results at a conference hosted by Carnegie Mellon University.
Take a look HERE.
==================================================================
Top 10 geek vacations - Part I
What makes a great geek vacation? Well, high-speed access from even the most obscure locale is a given. Then throw in some activities to stimulate the brain cells, maybe a dose of electronic entertainment, possibly a bit of techie history, and you’re most of the way there. Of course, it also helps if your chosen location is frequented by similarly techie folks and has some out-of-the-mainstream cred, meaning it would make your non-alpha geek friends roll their eyes.
Take a look HERE.
==================================================================
Ebuyer.com runs on a Commodore 64
Online retailing can be a rough sport. The competition is rabid, customer loyalty is fickle, and IT expenses can go through the roof. That's why The Register can appreciate an e-tailer with a unique business model. A hawk-eyed El Reg reader points out that UK online retailer Ebuyer.com appears to be cutting costs by running its site on servers dating back to the late Cretaceous period - roughly speaking. According to internet monitoring company Netcraft, the e-tailer has bypassed run-of-the-mill legacy servers for some serious heirlooms.
Take a look HERE.
==================================================================
Microsoft tries evading new GPL grasp
Microsoft on Thursday took steps to avoid entanglement with a new version of the General Public License, the most widely used license in the free and open-source software domain. The company long has objected to the GPL and generally prefers its secretive, proprietary software development practice. But a November partnership with Linux seller Novell, under which Microsoft sells certificates entitling customers to Novell's Suse Linux Enterprise Server support subscriptions and guarantees it won't sue those customers for patent infringement, brought Microsoft into closer contact with the GPL.
Take a look HERE.
==================================================================
Inside the Mind of a Hacker
During the 2004 presidential campaign, Jeremy Poteet watched as the candidate's site he had worked to secure went up. Just 16 minutes later, the site was attacked.
But this high-profile site deftly deflected these attacks and the others that followed because Poteet had anticipated—and then protected against—the kinds of exploits he knew would be coming. How did he know? Quite simply, he's a hacker, and thinking like a hacker—and getting to know the tools that hackers use—is one of the most effective ways to protect your company from being exploited.
Take a look HERE.
0 Comments:
Post a Comment
<< Home