July 5, 2012
You’re Not as Secure as You Think
Small Business Security Infographic via Veracode
Stay informed with Threatpost’s small and mid-sized business coverage.

You’re Not as Secure as You Think

Small Business Security Infographic via Veracode

Stay informed with Threatpost’s small and mid-sized business coverage.

June 15, 2012
A Graph of the Increase in Computer Security Jobs Posted Online
via Forbes

A Graph of the Increase in Computer Security Jobs Posted Online

via Forbes

June 15, 2012

Visualizing Botnets via Unveillance

Check out Threatpost’s botnet coverage here.

June 5, 2012
Cloudflare CEO: AT&T Voicemail Hack Key To Compromise
Loose security protecting voice mailboxes at mobile carrier AT&T provided a key element necessary to successfully hack the Google Enterprise Apps account of tech firm CloudFlare, according to an account of the hack posted by CEO Matthew Prince.
Read more:
Infographic via Cloudflare

Cloudflare CEO: AT&T Voicemail Hack Key To Compromise

Loose security protecting voice mailboxes at mobile carrier AT&T provided a key element necessary to successfully hack the Google Enterprise Apps account of tech firm CloudFlare, according to an account of the hack posted by CEO Matthew Prince.

Read more:

Infographic via Cloudflare

May 31, 2012

Exploring ‘The Deep Web’

The Deep or Invisible Web consists of the parts of the Internet that are not reported by normal search engines. Researches claim that standard search engines index only a small portion of the overall web, the remaining parts of which remain largely unknown.

-Security Affairs

February 7, 2012

A Visual Sample of Denial of Service Attack Tools and Services:

Via Arbor Networks 

Read more about everything DDoS related at Threatpost.

October 31, 2011
In celebration of Halloween, Trend Micro pulled together a list of cybercriminal scare-tactics and compiled them in this infographic.

In celebration of Halloween, Trend Micro pulled together a list of cybercriminal scare-tactics and compiled them in this infographic.

August 4, 2011

Images via McAfee [PDF] by way of Threatpost:

Global 2000 companies can be split into two categories, according to the author of a new white paper from McAfee; those that know they’ve been compromised and those that don’t yet know…

July 15, 2011

Outdated Assumptions:

A Threapost editorial by Gunter Ollman

[Image 1]

The simplistic view of the threat is that the entity conducting the attack contains, manages and orchestrates all the components necessary to perform the attack. Or, in a simple Venn diagram format, the delivery, malware and fraud components are defined as being core components of the “attacker”.

The reality of the situation is very different…

[Image 2]

In today’s federated cybercrime ecosystem, the “attacker” selects and manages relationships with multiple external entities that specialize in the delivery of specific components of an attack. Each specialization is independent of the attacker – and will more than likely be servicing multiple “attackers” simultaneously. More importantly, most of the service providers are so removed from the actual attack (and attacker) that the “victim” is unimportant and irrelevant to their contribution.

9:02am  |   URL: http://tmblr.co/Z1C9jx77_VwE
  
Filed under: security hacking hackers tech 
Liked posts on Tumblr: More liked posts »