SECURITY NEWS

Five Things Every Pen Tester Should Know About Working with Lawyers

  • Kamis, 03 Jul 2014
  • Penulis: John Strand via SANS

1. You can always be sued 2. How Lawyers Think About Pen Tests...

Selengkapnya

Hackers Infiltrate Desk Phones for Epic Office Pranks

  • Kamis, 03 Jul 2014
  • Penulis: Andy Greenberg, Wired

"That?s the lesson of a demonstration hackers Brandon Edwards and Ben Nell have planned for the Summercon security conference in New York today...

Selengkapnya

June Advance Notification: seven security updates to kick off the summer

  • Rabu, 25 Jun 2014
  • Penulis: Debra Littlejohn Shinder, GFI Blog

"This month Microsoft will be releasing seven security updates for your patching pleasure. The good news is that only two of them are rated as critical and one of them won?t be relevant to you unless you?re running a Lync Server. The rest, though, affect Windows, Office and Internet Explorer, so there?s no getting around the need to update...

Selengkapnya

Threat Mitigation and the 20 critical security controls with Tony Sager

  • Rabu, 25 Jun 2014
  • Penulis: Anthony M Freed, Tripwire Blog

"The 20 Critical Security Controls (20 CSC) provide a baseline for implementing the necessary technical controls that are required to ensure a robust network security posture...

Selengkapnya

On Snowden Anniversary, Microsoft Calls for Surveillance Reform

  • Selasa, 24 Jun 2014
  • Penulis: Michael Mimoso, ThreatPost

"On the anniversary of the first news reports on NSA surveillance, Microsoft general counsel Brad Smith seized the opportunity to draw a line in the sand with the U.S. government...

Selengkapnya

Man Fined $6,400 for XSS Attack on Singapore President's Website

  • Selasa, 24 Jun 2014
  • Penulis: Eduard Kovacs, Security Week

"A Singaporean man has been fined $6,400 for launching a cross-site scripting (XSS) attack on the official website of Istana, the residence and office of the President of Singapore, back in November 2013...

Selengkapnya

Vodafone puts out wide-ranging transparency report, hinting at secret surveillance programs

  • Senin, 23 Jun 2014
  • Penulis: David Meyer, Gigaom

"The carrier group has published a very lengthy and reasonably detailed breakdown of its interactions with law enforcement and spy agencies, covering 29 countries where its operators have faced metadata and wiretap requests...

Selengkapnya

Spammer sprung to run Russian national payment system

  • Selasa, 17 Jun 2014
  • Penulis: Darren Pauli, The Register

"Russia has reportedly hired a man to develop its national payments system, days after the alleged mastermind of one of the country's biggest pharmacy spam networks was granted early parole. The criminal allegations following Pavel Vrublevsky were prodigious but were largely denied or unconfirmed by the 35 year-old Moscow native...

Selengkapnya

Going Beyond PCI Compliance (interview with Ellen Richey, chief legal officer and enterprise risk officer at Visa)

  • Selasa, 17 Jun 2014
  • Penulis: Megan Goldschmidt, Bank Info Security

"Ellen Richey, chief legal officer and enterprise risk officer at Visa, says card issuers, retailers, payments processors and others handling card data must go beyond PCI compliance if they expect to effectively fight fraud. "There are already best practices out there that go beyond the technical side of PCI," Richey says in an interview with Information Security Media Group (transcript below). Those best practices include guidelines and recommendations related to the need for wider adoption of chip cards, such as those that conform to the Europay, MasterCard, Visa standard, tokenization and end-to-end encryption...

Selengkapnya

Navy Puzzle Challenge Blends Social Media, Cryptology

  • Selasa, 17 Jun 2014
  • Penulis: Kathleen Hickey, GCN via DFI News

"The Navy recently announced the winners of its cryptology puzzle game challenge: ?Project Architeuthis.? The puzzle, consisting of daily clues posted on Facebook, targets the cryptology technician community and was an attempt to raise awareness of the Information Dominance Corps. The challenge calls on Navy cryptology technicians to collect and analyze encrypted electronic communications, jam enemy radar signals, decipher information in foreign languages, maintain the state-of-the-art equipment, and defend and analyze networks...

Selengkapnya

Pemantauan Trafik Internet Nasional

Laporan pemantauan trafik internet nasional dengan menampilkan laporan trafik mingguan, trafik bulanan dan trafik tahunan.

Peringatan Ancaman Keamanan & Kerentanan Sistem

Kumpulan arikel tentang peringatan dini ancaman keamanan dan kerentanan sistem.

Berita Keamanan Siber

Kumpulan berita tentang keamanan siber atau IT.

Laporan Hasil Monitoring

Laporan Hasil Monitoring Keamanan Siber Nasional yang dilakukan oleh BSSN meliputi Laporan Bulanan dan Laporan Tahunan.