The Business Value Of NetFlow : Why Invest In NetFlow Technology?

 The Business Value Of NetFlow : Why Invest In NetFlow Technology?There has been a rapid increase in demand for security solutions that can defend against Advanced Persistent Threats (APTs). Why? Because today, cyber criminals don’t use a specific attack to compromise targeted networks. Continue reading

VN:F [1.9.22_1171]
Rating: 5.0/5 (1 vote cast)

Cool Book : Nmap 6 – Network Exploration and Security Auditing Cookbook

Screen Shot 2012 12 06 at 3.29.13 PM Cool Book : Nmap 6 – Network Exploration and Security Auditing Cookbook

I get invited to review things from time to time. My latest invite was reviewing a cookbook style guide designed to be a reference for beginner and advance Nmap users. For those that are not familiar with Nmap, it’s an open-source tool built for network exploration and security auditing. Nmap users range from ethical penetration testers to evil hackers. There are dozens of tools that perform automated assessment functions however nothing beats a very skilled Nmap user. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

Defending Against Distributed Denial Of Services DDoS Attacks

 Defending Against Distributed Denial Of Services DDoS AttacksIf you are internet facing, you are vulnerable to Distributed Denial of Services or DDoS attacks. Attacking network services is on the rise as the price for computing power decreases and people become more dependent on technology. Studies from leading service providers show DDoS attacks have grown from 9 to 500 Gbps in the last five years. Botnets are becoming an underground commodity that can be rented for as low as 10 dollars an hour to launch strategic DDoS attacks. Governments are investing in military strategies based on the ability to interrupt enemy computer services through targeted DDoS attacks. These attacks are indeed a weapon of mass disruption. Continue reading

VN:F [1.9.22_1171]
Rating: 5.0/5 (1 vote cast)

Penetration Testing Tools At Your Next Security Conference – WIFI Pineapple Mark III

pineapple 942x1024 Penetration Testing Tools At Your Next Security Conference – WIFI Pineapple Mark IIIToday’s highlight – WIFI Pineapple Mark III Wireless Penetration Testing Tool.

There are many cool tools sold at conferences. One tool to check out is the WIFI Pineapple Mark III for around $100 dollars. Basically it’s a wireless honeypot using a man-in-the-middle attack to access data. The way it works is it listens for devices calling out for known wireless networks / SSIDs. The WIFI Pineapple will hear the request and clone the requested SSID so the device believes its connecting to a known trusted network. Continue reading

VN:F [1.9.22_1171]
Rating: 5.0/5 (4 votes cast)

Cyber Crime Is A Well Funded Enterprise. A Look At Who Is Hacking You

14Hacker 1 popup1 245x300 Cyber Crime Is A Well Funded Enterprise. A Look At Who Is Hacking You
Some people believe people behind Cyber Crime are disgruntled teenage hackers looking to cause chaos for fun. In some cases that may be however the majority of Cyber Crime is performed by well-funded organized criminals. Yes, I’m talking about the godfather like people who robbed banks and distributed narcotics on the street corner prior to the computer age. Organized crime realized it’s faster to automate an attack against millions of virtual targets rather than physically deal with criminal activity. Who is really behind Cyber Crime and how do they operate? Lets take at look at a case study of popups to understand the Cyber Crime organization. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)