Stream

Join this community to post or comment
 
RIP protocol scan graph added to post http://oversitesentry.com/?p=2368  port 520 RIP being used for DDOS #cybersecurity attacks 
1
Add a comment...
 
We Depend On IT Competence & Reliability http://oversitesentry.com/?p=2368  #cybersecurity must #testforsecurity RIPv1 obsolete 
If you are not in the IT field who would understand all the details of a potential hack-attack, here are some headlines in news today that may not create a full picture: http://www.darkreading.com/perimeter/ddos-attackers-exploiting-80s-era-routing-protocol/d/d-id/1321138?
1
Add a comment...

PKWARE

Security  - 
 
Good luck with that ... 
1
Federico Bettero's profile photoGustuv Wynd's profile photo
5 comments
 
+Lars Larsen Yeah, I think I think it would make more sense for a ban on bans personally.
Add a comment...
 
90% CC Machines Have Default Password http://oversitesentry.com/?p=2355  Time to change PW with new EMV changes #cybersecurity 
As I was going through the Top 100Cyber Security blogs one post stood out to me: http://money.cnn.com/2015/04/29/technology/credit-card-machine-hack/. Apparently 90% of all credit card machines have the default password , which happens to be: 166816 and Z66816 since 1990.
1
1
Oleg I. Ovechkin's profile photo
Add a comment...
 
 
All Russian hackers should be hunted down and killed. I have been getting all my TV shows from #eztv for many years.


#tech
#russia
#hackers 
View original post
1
Add a comment...
 
I am/was/will be a vistum of identity theft.  Am I fixed?  I don't know.  I am going to develop a blog roll of sites a (woman, single) can visit to  learn more.  Suggestions for my project or for me, gratefully appreciated.  PS  Think Fairborn Ohio and Clark county.   cjb
1
Add a comment...
 
WiFi - PCI compliance: Why is it Important? http://oversitesentry.com/?p=2351  In #cybersecurity #testforsecurity WiFi APs 
New devices and old alike: linksys-wifirouter. The issue with WiFi is that it is a network piece that can bite you if you are not aware of it. In PCI compliance the relevant section (besides the sections for configuring your device correctly at 4.1). The testing of Wireless networks is in 11.1: ...
4
1
Alejandro Gutiérrez's profile photo
Add a comment...
 


Dear,

 

(Brazilian Portuguese version bellow – Versão em português abaixo)

 

My name is Antonio Augusto, and I am currently doing a MS in Computer Science in Brazil. My research focus on the use of Machine Learning techniques on IDS (Intrusion Detection Systems) alerts.

 

There has been a lot of work on this area in recent years, which tries to bring some improvements on the way we deal with alerts. However, the academia has no way to know which approach will be most beneficial to the system analyst.

 

We are trying to fill this gap, and would really appreciate your help. We have devised a simple survey, which will help us discover which areas of the IDS you think needs more improvement.  It will take only about 10 minutes from your time to answer the survey.

 

We have forms in English and Portuguese; choose the one will feel more comfortable with. Please, answer only one version of the form.

 

Also, if you can, please forward this message to any of your friends that work with IDSs, the more people we have, the better.

 

Thanks a lot for your help!

 

The form in English: http://goo.gl/forms/5xoo4Yr6PU

The form in Portuguese: http://goo.gl/forms/VhZOnIr3PF

----------------

(Portuguese version – Versão em Português)

Prezados,

 

Meu nome é Antonio Augusto, e eu estou fazendo um mestrado em Ciência da Computação no Brasil. O foco da minha pesquisa é sobre o uso de técnicas de Aprendizado de Máquina em alertas de IDSs (Sistemas de Detecção de Intrusão, na sigla em inglês).

 

Atualmente tem havido muito trabalho nessa área, muitos que tentam melhorar a maneira como lidamos com alertas de IDSs. No entanto, a área acadêmica não tem como saber que abordagem trará os melhores ganhos para os analistas de segurança.

 

Nós estamos tentando fechar essa lacuna, e gostaríamos de sua ajuda. Nós desenvolvemos um questionário que vai nos ajudar a descobrir quais áreas do IDS vocês acham que precisam de mais melhorias. Responder o questionário não vai levar mais de 10 minutos.

 

Temos versões do formulário em português e inglês; escolha a que você se sentir mais confortável em responder. Por favor, responda apenas uma versão.

 

Além disso, se você puder encaminhar essa mensagem para outras pessoas que trabalham com IDS nós seriámos muito gratos.

 

Muito obrigado pela ajuda!

Questionário em inglês: http://goo.gl/forms/5xoo4Yr6PU

Questionário em português: http://goo.gl/forms/VhZOnIr3PF
 ·  Translate
1
Add a comment...
 
Rerdom Trojan delivered to victim's computer
Security researchers at Damballa noticed the chain of events while investigating on a customer’s network an incident caused by a threat actor they call #RuthlessTreeMafia, who initially ran an operation to defraud “pay-per-click” advertisers.
1
1
Aleksandar Buza (owl)'s profile photo
Add a comment...
 
 
#hackers   #warsaw  
Find out the best and most accurate #news #headlines.
latestnewsheadline.com
About 1,400 passengers of the Polish airline LOT were grounded at the Warsaw airport after hackers attacked the systems used to issue flight plans.
View original post
1
Add a comment...
 
What Makes a NextGenerationFireWall(NGFW) & Why Use It? http://oversitesentry.com/?p=2328  #cybersecurity must have 
We know a firewall protects the network basic networkdiagram. By using Port or protocol filter lists (also known as Access Control Lists) a firewall does protect the network in a minimal manner. But doing IP header filtering is not enough today when there are so many attackers and they can ...
1
Add a comment...

HotHardware

Security  - 
 
Uh oh, anyone hack this yet? #Windows10 #Mobile #WiFi #WiFiSense  
Microsoft's Windows 10 Mobile looks to be a tremendous upgrade over the previous version (the same could be said about the desktop versions as well)...
1
Add a comment...

EZShield

Security  - 
 
The FTC reveals a popular #Android reward app to be malicious. Here’s what “Prized” users need to know…
Apps like "Prized" are dangerous not only because they misrepresent themselves to consumers but also because they cost users' time, resources, and money.
1
1
Sherry Winter's profile photo
Add a comment...
 
Last week, #Adobe issued an emergency security patch fixing a critical flaw in its Flash Player that could allow a remote hacker to take complete control of Windows, Mac and Linux computers.
At the time of public disclosure, it was believed that the vulnerability (known as CVE-2015-3113) was being exploited by a Chinese hacking gang known as APT3.
If you're going to do one thing today, make sure your computers are running an up-to-date version of Flash.
2
2
Paul Scollon's profile photoFabio Colella's profile photo
Add a comment...

Connie Tai

Security  - 
 
 Available for licensing to IT training business. ITpreneurs comprehensive portfolio of cyber security courseware . Help your clients now with much needed knowledge and skills to protect and defend against cyber attacks  http://itprn.rs/1IGgdxx
2
Add a comment...
 
AV-TEST lab recently tested 22 #Internetsecurity suites for their protection, performance and usability. Well-known suites that charge a fee for their services scored the best results. Depending upon the type of license, the cost of protecting a Windows PC is only around 1 Euro per month.
AV-TEST lab recently tested 22 Internet security suites for their protection, performance and usability. Well-known suites that charge a fee for their services scored the best results. Depending upon the type of license, the cost of protecting a Windows PC is only around 1 Euro per month.
2
Add a comment...
 
What Do Compromised Websites Look Like? http://oversitesentry.com/?p=2339  #cyber attackers leave no trace must #testforsecurity 
Sucuri Blog has an interesting blogpost on how a website got compromised and allowed unencrypted Credit Card numbers(only in one specific area and for a few seconds) to be stolen from the Magento Ecommerce platform for a period of time. Magento is an Ecommerce web system.
1
Add a comment...
 
Google Project Zero bod drops 15 remote code execution holes
3
2
Emmanuel Taban's profile photoMike Dickinson's profile photo
Add a comment...