SecurityLive

Being on the Internet, the Cyberwildcats network is just as much on the front lines as anyone else who’s connected. Help us watch for the attackers by monitoring and analyzing the Firewall, IDS, and webserver logs of the CWCnet’s link to “The Big I”. Identify attacks, study their activity and behaviors, and learn to distinguish between noisy nonsense and The Real Thing.

 

2 Responses to SecurityLive

  1. BlueAngles6 says:

    Greetings Cyberwildcats,

    Have any of you heard anything pro or con about the
    “Tor Project: Anonymity Online”? (Please see links below)

    Is this type of security useful for business privacy use
    over the internet? Maybe this is nothing new at all.

    https://www.torproject.org/

    http://www.wired.com/threatlevel/2013/08/freedom-hosting/

    I came across the Tor Project website from an IT Security friend.
    It looked interesting, not sure if I would trust their network of hops.

    BTW, attached August’s IEEE Spectrum ComputerWise News below
    about an interesting hardware security device to keep cloud data safe.

    Enjoy!

    Thanks,
    BlueAngles6

    Begin forwarded message:

    From: “IEEE Spectrum ComputerWise Newsletter”
    Date: August 7, 2013, 10:40:12 AM EDT
    Subject: Hardware Trick Could Keep Cloud Data Safe

    To view this e-mail as a web page, go here
    Forward to a friend | Print
    CONNECT WITH US:

    Software, Systems and IT: News and Analysis 7 August 2013

    Hardware Trick Could Keep Cloud Data Safe
    Researchers at MIT say they’ve designed a chip that makes it immensely difficult for attackers to glean information about the data stored in cloud servers. The chip, dubbed Ascend, hides the way CPUs request information. When a computer program requests data stored in the machine’s main memory, Ascend’s memory controller reads not only the memory location of the requested data but also those of an entire group of addresses—and it makes these requests on a strict schedule. This means that side-channel attacks, in which an observer tries to get information about what’s on a server by measuring things like computation time, memory traffic, and power consumption, are much more difficult to pull off.
    ADVERTISEMENT

    COMPUTER NEWS

    Researchers Hack Into Car Immobilizers, But Can’t Say How They Did It
    The English High Court of Justice bars a paper some say could encourage car theft

    OSI: The Internet That Wasn’t
    How TCP/IP eclipsed the Open Systems Interconnection standards to become the global protocol for computer networking

    Port of New York and New Jersey’s Computer Problems are Virginia’s Gain
    Banks’ computer systems have a bad week, so do U.S. state governments’ again

    Black Hat USA 2013 Highlights a Bevy of Exploits
    But none bigger than the one people came to hear NSA director Gen. Keith Alexander talk about

    Webinar Available Now: Challenges & Solution Needs for Delivering the Promise of Next Generation Infotainment
    In this webcast learn about distinct requirements of the development infrastructure that would support creation and evolution of these next generation infotainment systems platforms and applications. REGISTER HERE

    ADVERTISEMENT

    ADVERTISEMENT

    BACK ISSUES | Interested in other IEEE Newsletters? SIGN UP HERE. | PRIVACY POLICY | PRINT THIS ISSUE

    CONNECT WITH US:
    This email was sent by IEEE | 3 Park Avenue New York, NY 10016 USA | UNSUBSCRIBE | ADVERTISE

    © 2012 IEEE – All rights reserved. Use of this Web site signifies your agreement to the terms and conditions.

  2. BlueAngles6 says:

    FYI, I’ve had 3 live phone calls this year to my home phone from these windows tech support scammers who are usually in Caribbean or overseas locations with fake websites.

    Please read the Microsoft www link below. Beware of this scam & DO NOT follow any requests from them to connect to your computer!!!

    http://www.microsoft.com/security/online-privacy/avoid-phone-scams.aspx

Leave a Reply



Login

Register | Lost your password?