Showing Tag: "cyber" (Show all posts)

Security Through Obscurity (STO): A fundamental fallacy

Posted by Saumil on Friday, June 15, 2018, In : Infosec 

When a company’s password policy is too complex, employees tend to write their passwords on a piece of paper and put it under their keyboard — similar to hiding a house key under the doormat — which is the first place an intruder looks.  This gives a false sense of security in the sense that if no one knows where to find the key, then no one can get in your house. This is an example of Security Through Obscurity (STO) or a “security theater,” which creates an illusion of security. I...


Continue reading ...
 

The Armageddon of Cyber Security

Posted by Saumil on Tuesday, November 23, 2010, In : Infosec 

War...Huh! What is it good for? Absolutely SOMETHING! The question on everybody's mind "When will it end?" is now slowly changing to "How will it end?". A security professional lives more like a life of a soldier fighting at the border, only difference is, the enemies shoot syn packets at our computers which bleeds from their open ports. Once bled, they keep shooting all kinds of probes untill its hacked or all bled out (DoS).

An evident fact in our cyber society is that the "Bad" is always ...


Continue reading ...
 

A rise in cyber attacks by one third saw 100 per cent of enterprises experience cyber losses in 2009

Posted by Saumil on Thursday, February 25, 2010, In : Internet 

Under half of organisations rate security as their top issue, while three quarters experienced cyber attacks in the last 12 months.

According to Symantec's 2010 State of Enterprise Security study, 75 per cent of enterprises experienced cyber attacks in the last 12 months and 36 per cent rated the attacks somewhat/highly effective. Also, there was a 29 per cent rise in reported attacks in the last 12 months.

       

It also found that 100 per cent of enterprises surveyed experienced cyber lo...


Continue reading ...
 

Terrorists 'gaining upper hand in cyber war'

Posted by Saumil on Tuesday, February 9, 2010, In : Cyber Terrorism 

Western governments are facing a potent and ill-understood new threat from terrorists and hostile powers in the shape of cyber warfare, military and security experts have warned.

Network attacks, a British government report says, are "growing in seriousness and frequency". And in a timely reminder of the emphasis that states and corporations alike are placing on the problem, Google and the National Security Agency were yesterday said to be finalising the details of a co-operative deal aimed ...


Continue reading ...
 

Today’s threat: computer network terrorism

Posted by Saumil on Monday, February 1, 2010, In : Cyber Terrorism 

“Carry out all my demands or the entire country’s electricity will be cut off.” Is this another line from a suspense film, or is it a palpable threat made possible with a computer keyboard? “Today, there is a growing trend amongst hackers around the world to threaten national infrastructures for ransom,” says Dr. Yaniv Levyatan, an expert in information war at the University of Haifa.

If someone still thinks that this is science fiction, Dr. Levyatan notes how just recently, in Nov...


Continue reading ...
 

Technology Bites Back

Posted by Saumil on Monday, October 12, 2009, In : Infosec 

GPS

A couple of weeks ago a friend told me that someone she knew had their car broken into while they were at a football game. Their car was parked on the green which was adjacent to the football stadium and specially allotted to football fans. Things stolen from the car included a garage door remote control, some money and a GPS which had been prominently mounted on the dashboard.  

When the victims got home, they found that their house had been ransacked and just about everything worth any...


Continue reading ...
 

Black Ice: The Invisible Threat of Cyberterrorism

Posted by Saumil on Monday, July 6, 2009, In : Cyber Terrorism 

Cyberterrorism is a new terrorist tactic that makes use of information systems or digital technology, especially the Internet, as either an instrument or a target. As the Internet becomes more a way of life with us,it is becoming easier for its users to become targets of the cyberterrorists. The number of areas in which cyberterrorists could strike is frightening, to say the least.

The difference between the conventional approaches of terrorism and new methods is primarily that it is possib...


Continue reading ...
 

Spies Penetrate Pentagon's Joint Fighter-Jet Project

Posted by Saumil on Wednesday, April 22, 2009, In : Infosec 
Cyber spies have stolen tens of terabytes of design data on the US's most expensive costliest weapons system -- the $300 billion Joint Strike Fighter project. Similar breaches have been found in the Air Force's Air Traffic Control System. The attacks began as far back as 2007 and continued into 2008. The spies encrypted the data that they stole, making it difficult for investigators to know exactly what data was taken. The fact that fighter data was lost to cyber spies was first disclosed by ...
Continue reading ...
 
 

Saumil's Infosec Blog


Information Security Hi, welcome to my blog. It started out as a place to be able to post links and news so I could find them again. I welcome you to share your thoughts or any opnions you may have on any of the posts by me. Thanks for stopping by. Dont forget to use the search on the home page if you dont see what you're looking for.

Make a free website with Yola