Archive for the ‘SECURITY’ Category

Security in-a-box is a collaborative effort of the Tactical Technology Collective and Front Line. It was created to meet the digital security and privacy needs of advocates and human rights defenders.  Security in-a-box includes a How-to Booklet, which addresses a number of important digital security issues. It also provides a collection of Hands-on Guides, each of which includes a particular freeware or open source software tool, as well as instructions on how you can use that tool to secure your computer, protect your information or maintain the privacy of your Internet communication. There are also details of Portable security software. It is well worth reading.

5 open source security projects to watch – 5 security products that will help guard against threats without impacting your budget.

7 Best Network Security Linux Distributions – here’s a list of special purpose distros. These distributions are mainly designed to perform network security tasks such as vulnerability assessment and penetration testing in order to prevent and monitor unauthorized entry, abuse, alteration, or denial of computer network resources.

BitDefender Releases QuickScan to Provide Free Security Check for PCs – BitDefender®, an award-winning provider of innovative internet security solutions, today announced the full release of BitDefender QuickScan, an advanced online tool used for detecting malware running on computers.

6 of the Best Free Linux Digital Forensics Tools – an insight into the software that is available, a list of 6 digital forensics tools

6 Free Ways to Stay Secure in the New Year – Here are half a dozen no-cost ways to keep your system secure

Internet fraud for dummies: practical advice for protecting yourself against online scams – Internet fraud has been around for just about as long as the Internet itself. Each year, cybercriminals come up with new techniques and tactics designed to fool their potential victims. This article examines different types of fraud and what you can do to protect yourself against them.

Disaster management using open source and social media – Interesting post by Craig Thomler – Ushahidi and Sahana are open source, free-to-use web-based platforms designed to be highly resilient during disaster situations and flexible to the needs of both developing and developed nations

All the latest in the Security and Open source fields –  The H: Security news and Open source developments,  plus the H Internet Toolkit

Interesting post on the Securosis blog on Network Security Fundamentals – http://securosis.com/blog/network-security-fundamentals-monitor-everything

If you’re looking for a comprehensive monitoring solution for your organisation’s infrastructure, OSSEC is a scalable, multi-platform, open source Host-based Intrusion Detection System (HIDS). It has a powerful correlation and analysis engine, integrating log analysis, file integrity checking, Windows registry monitoring, centralized policy enforcement, rootkit detection, real-time alerting and active response.

It runs on most operating systems, including Linux, OpenBSD, FreeBSD, MacOS, Solaris and Windows. A list with all supported platforms is available here. The download link is here

Welcome to The H

The H is about security and open source topics and has regularly updated news and features, subscribe to their RSS feeds and keep up to date automatically.

Very useful set of resources, well worth watching.  They’ll give you an overview of the issues that you might need to address in your organisation – http://www.worksmart.org.uk/nsfw/

Very interesting post from Ross Dawson about plans to enable organisations to use Facebook more securely and not just block it out of hand because of security and other concerns.

http://www.rossdawsonblog.com/weblog/archives/2007/12/how_to_make_fac.html

New paper from ENISA (European Network and Information Security Agency) on Security Issues with Social networks

http://www.enisa.europa.eu/doc/pdf/deliverables/enisa_pp_social_networks.pdf 

If you have an interest in how identity is created and managed on the web, then watch this space…

 http://iiw.idcommons.net/index.php/Iiw2007b

and here’s an excellent video on Open ID http://www.youtube.com/watch?v=xcmY8Pk-qEk

From SANS (http://isc.sans.org) – Some interesting analysis about “Storm” from SRI International

http://www.cyber-ta.org/pubs/StormWorm/