[From the desk of Paul Davis – his opinions and no-one else’s] Apart from the reporter’s opinions π So onto the news: Why cyber should not be limited to cyber Open-source intelligence (OSINT) is not new, and making sense of data from publicly available sources is as relevant for cyber…
Month: August 2016
From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail19.atl51.rsgsv.net;
[From the desk of Paul Davis – his opinions and no-one else’s] Apart from the reporter’s opinions π So onto the news: Web Scanning Engine launched a web scanning engine with capabilities to find similar registered domain names, blacklist checker and link analysis tools for domains and threat intelligence data….
From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail176.wdc02.mcdlv.net;
[From the desk of Paul Davis – his opinions and no-one else’s] Apart from the reporter’s opinions π So onto the news: Malware performs fraudulent actions on social media Known as the Linux/Moose, the malware primarily targets Linux-based consumer routers and infect other Linux-based embedded systems. Once infected, the compromised…
From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail24.atl11.rsgsv.net;
[From the desk of Paul Davis – his opinions and no-one else’s] Apart from the reporter’s opinions π So onto the news: 20% of IT professionals have witnessed a security breach cover-up Research conducted by AlienVault has shown that 20% of IT security professionals have witnessed a breach being hidden…
From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail44.atl161.mcsv.net;
[From the desk of Paul Davis – his opinions and no-one else’s] Apart from the reporter’s opinions π So onto the news: All roads lead to the need to strengthen your security operations center? Donβt have a SOC? Only have one or two security professionals dedicated to the practice of…
From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail24.atl11.rsgsv.net;
[From the desk of Paul Davis – his opinions and no-one else’s] Apart from the reporter’s opinions π So onto the news: The Logjam Attack Diffie-Hellman key exchange is a popular cryptographic algorithm that allows Internet protocols to agree on a shared key and negotiate a secure connection. It is…