Tag: intelligence
-
3 Ways to Use Real-Time Intelligence to Defeat Bots
Tags: intelligenceFirst seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/3-ways-real-time-intelligence-defeat-bots
-
Proactive real-time security intelligence: Moving beyond conventional SIEM
First seen on http: Jump to article: net-security.org/article.php
-
Illegale Ü;berwachung: Kim Dotcom darf Neuseelands Geheimdienst verklagen
Tags: intelligenceKim Dotcom hat einen weiteren juristischen Sieg errungen. Er darf die Polizei und den neuseeländischen Geheimdienst verklagen und bekommt Abhörprotoko… First seen on http: Jump to article: www.golem.de/news/illegale-ueberwachung-kim-dotcom-darf-neuseelands-geheimdienst-verklagen-1212-96183.html
-
[Video] OPSEC: Because Jail is for wuftpd
PRESENTATION ABSTRACT:Drawing on lessons gleaned from recent hacker indictments, research on surveillance, espionage and counter-intelligence, this ta… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/ZmQ2LPxukJg/6326
-
[Video] Supercomputing, Malware and Correlation
PRESENTATION ABSTRACT:For more than two years, ThreatGRID has been building a threat intelligence service where samples and content are cross-indexed … First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/sumT7nEVNdc/6328
-
Attack Intelligence-Sharing Goes ‘Wire-Speed’
First seen on http: Jump to article: darkreading.com/threat-intelligence/167901121/security/vulnerabilities/240143864/attack-intelligence-sharing-goes-wire-speed.html
-
Swiss intelligence agency loses terabytes of data to an insider
An IT technician working for the Swiss intelligence agency NDB simply downloaded and walked out with terabytes of data the equivalent of ‘thous… First seen on http: Jump to article: www.infosecurity-magazine.com//view/29691/swiss-intelligence-agency-loses-terabytes-of-data-to-an-insider/
-
Schweizer Geheimdienst-Techniker des Diebstahls von Terrorismusabwehr-Daten verdächtigt
Er hat angeblich mehrere Terabyte Daten entwendet. Als Führungskraft des Geheimdiensts NDB hatte er uneingeschränkten Zugriff auf alle Netzwerke. Der … First seen on http: Jump to article: www.zdnet.de/88134734/schweizer-geheimdiensttechniker-des-diebstahls-von-terrorismusabwehr-daten-verdachtigt/
-
‘Knight X Plus’ – Cyber intelligence product from ClubHack2012
First seen on http: Jump to article: www.ehackingnews.com/2012/12/knight-x-plus-cyber-intelligence.html
-
Resilient Security Requires Creativity and Intelligence
Tags: intelligenceTry to dampen your innate cynicism for one second, forget the source of this next comment, and absorb it:;“We need resilient defenses.â€Â;Dr… First seen on http: Jump to article: threatpost.com/en_us/blogs/how-tips-shopping-online-112012
-
Tech Insight: Better Defense Through Open-Source Intelligence
First seen on http: Jump to article: darkreading.com/blog/240142294/tech-insight-better-defense-through-open-source-intelligence.html
-
Tech Insight: Better Defense Through Open Source Intelligence
First seen on http: Jump to article: darkreading.com/security/vulnerabilities/240142294/tech-insight-better-defense-through-open-source-intelligence.html
-
Threat Intelligence Hype
First seen on http: Jump to article: darkreading.com/security-monitoring/167901086/security/news/240142229/threat-intelligence-hype.html
-
[Video] Mobile Exploit Intelligence Project
As organizations look to deploy larger numbers of mobile devices this year, there is widespread disagreement over which platforms are more secure, wha… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/v1kc8GanLTc/6164
-
Risk I/O Lands $5.25 Million To Expand Its Vulnerability Intelligence Platform
First seen on http: Jump to article: t.co/VNDczafj
-
Live cyber risk intelligence for enterprise security
First seen on http: Jump to article: net-security.org/secworld.php
-
Dell SecureWorks launches Targeted Threat Intelligence Services: The new security services will help organisatio…
First seen on http: Jump to article: bit.ly/ZpmsCc
-
Manning offers a plea in WikiLeaks espionage case
Facing charges of treason and looking for a deal, a former Army intelligence analyst is willing to plead guilty to lesser charges in the case brought … First seen on http: Jump to article: www.infosecurity-magazine.com//view/29258/manning-offers-a-plea-in-wikileaks-espionage-case/
-
[Video] DerbyCon 2012 – Separating Security Intelligence from Security FUD
Security Intelligence is the study of a significant amount of data from internal and external sources. The correlation of that data, is how we determi… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/smtqj2hdJg4/6116
-
UK businesses get cybersecurity response team to call on if attacked: The UKs intelligence services have unveil…
First seen on http: Jump to article: bit.ly/T0WKzy
-
Tech Insight: Five Steps To Implementing Security Intelligence
Tags: intelligenceFirst seen on http: Jump to article: darkreading.com/threat-intelligence/167901121/security/vulnerabilities/240034527/tech-insight-five-steps-to-implementing-security-intelligence.html
-
Indian Security Agencies taking offensive mode for Cyber Security
The move comes at a time when proof shows countries launching cyber attacks not only for intelligence gathering and many nations describing the attack… First seen on http: Jump to article: thehackernews.com/2012/11/indian-security-agencies-taking.html
-
UK Intelligence recruiting brilliant minds for eavesdropping social networks
During a visit to Bletchley Park, UK foreign secretary William Hague launched a ‘spy drive’ to recruit staff for GCHQ and other intelligence agencies,… First seen on http: Jump to article: thehackernews.com/2012/11/uk-intelligence-recruiting-brilliant.html
-
Intelligence Official Offers New Timeline For Benghazi Attack
First seen on http: Jump to article: packetstormsecurity.org/news/view/21691/Intelligence-Official-Offers-New-Timeline-For-Benghazi-Attack.html
-
Patriot Hacker ‘The Jester’ list his all time favorite Open Source Intelligence toolset
A;Patriot Hacker ‘The Jester’ (or th3j35t3r) who made his name after harassing Anonymous activist group, disrupting WikiLeaks and stalking >>jihadist
-
RT WestbourneWCEL Good article: Cyber Intelligence: Identifying the Threat & U
First seen on http: Jump to article: t.co/1NBhoBWa
-
Gathering Threat Intelligence With Open Tools
Threat intelligence is one of the go-to buzz phrases for many people in the security industry right now, and it’s thrown in so many contexts and situa… First seen on http: Jump to article: threatpost.com/en_us/blogs/phishy-direct-messages-link-fake-twitter-sign-page-101612
-
Megaupload: Neuseelands Geheimdienst spionierte Kim Dotcom aus
Tags: intelligenceDer neuseeländische Geheimdienst hat dabei geholfen, Megaupload-Gründer Kim Schmitz zu finden. Legal war das nicht, der Premier kündigte eine Untersuc… First seen on http: Jump to article: www.golem.de/news/megaupload-neuseelands-geheimdienst-spionierte-kim-dotcom-aus-1209-94733.html
-
Android App Battery Long Charges Device, but Steals Critical Data
The latest Symantec Intelligence Report reports an Android application called “Battery Long†that charges smartphone batteries while steal… First seen on http: Jump to article: www.computerworld.in/news/android-app-charges-device-steals-critical-data-32732012
-
[Video] Leveraging Collective Intelligence To Combat Cyber Crime
Whether by computer, tablet or mobile phone, the headlines these days are filled with the latest security breaches. But while most security approaches… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/VL2LIZmmIKs/5950

