SecurityThreats

Android Malware – iBanking steals passwords

Posted on

This is a typical example how malware authors make money. They sell their programs and have other people make the attacks on you. RSA blogs has the story  – RSA is a security division of EMC company which has security encryption RSA was one of the first practicable public-key cryptosystems and is widely used for […]

computersecuritynews

Useful weblinks

Posted on

ARIN – American registry for Internet Numbers Whois database SANS – (SysAdmin, Audit, Networking, Security) A private company teaching the ins and outs of security DIG – an excellent utility to check DNS (Domain name service on the net at Kloth.net Virustotal – An excellent online malware analysis tool (wondering if a file has malware? […]

computersecuritynews

Cybersecurity Framework by NIST(National Institute of Standards and Technology)

Posted on

NIST Cybersecurity framework pdf The Framework Core consists of five concurrent and continuous Functions—Identify, Protect, Detect, Respond, Recover. This Framework is designed to protect critical infrastructure of the United States (utilities, police, fire, and other government functions) Small business owners can learn some things as to what to do in the primary function of the […]