Rapid7 security firm has published an interesting whitepaper entitled “Security Flaws in Universal Plug and Play” in which reports the result of a research conducted in the second half of 2012 that evaluated the global exposure of UPnP-enabled network devices.
Security world has be...
Someone early this year said the hacktivism phenomena and its symbol Anonymous, will exhausted its strength, sincerely I was shocked by this affirmation because I believe that is not possible to stop an ideology and hacktivism is a form to express the dissent with cyber operations. The Aar...
Russian President Vladimir Putin is considered one of the political figures most attentive to the development of a suitable cyber strategy to protect his countries from cyber attacks. Putin is an intelligent man who has always understood the strategic importance of cyberspace, according many ex...
Hacktivism attacks will not change Israeli policy but for sure their operations could represent a dangerous cyber threat for any government. Anonymous has started a cyber offensive against Israel to protest for the attacks on Gaza, the hacktivists have defaced and taken offline hundreds o...
The world is holding its breath, the cyber threat is announced by the Anonymous group who has decided to celebrate November 5th in its own way, attacking a wide selection of targets. Anonymous celebrates Guy Fawkes Day, the British holiday commemorating a failed 17th-century plot to blow u...
The sole intention in creating this group is the timely notification and availability of the information to all the genuine cyber security and its allied field researchers so that the interested one can submit their research papers within time frame.
PS: Terms and Conditions are subject to change.
A group to help people work with, understand and benefit from ISO 27K (ISO 27000-series) related standards.
The ISO/IEC 27000-series numbering (“ISO27k”) has been reserved for a family of information security management standards derived from British Standard BS 7799. The following standards are either published or are under development:
• ISO/IEC 27000:2009 - provides an overview/introduction to the ISO27k standards as a whole plus the specialist vocabulary used in ISO27k.
• ISO/IEC 27001:2005 is the Information Security Management System (ISMS) requirements standard, a specification for an ISMS against which thousands of organizations have been certified compliant.
• ISO/IEC 27002:2005 is the code of practice for information security management describing a comprehensive set of information security control objectives and a set of generally accepted good practice security controls.
• ISO/IEC 27003:2010 provides guidance on implementing ISO/IEC 27001.
• ISO/IEC 27004:2009 is an information security management measurement standard.
• ISO/IEC 27005:2011 is an information security risk management standard.
• ISO/IEC 27006:2011 is a guide to the certification or registration process for accredited ISMS certification or registration bodies.
• ISO/IEC 27007:2011 is a guide to auditing Information Security Management Systems.
• ISO/IEC TR 27008:2011 concerns the auditing of technical security controls.
• ISO/IEC 27010:2012 provides guidance on information security management for
• inter-sector and inter-organisational communications.
• ISO/IEC 27011:2008 is the information security management guideline for telecommunications organizations (also known as ITU X.1051).
• ISO/IEC 27013 will provide guidance on the integrated/joint implementation of both ISO/IEC 20000-1 (derived from ITIL) and ISO/IEC 27001 (ISMS).
• ISO/IEC 27014 will cover governance of information security.
• ISO/IEC TR? 27015 will provide information security management guidance for organizations in the financial services industry.
• ISO/IEC TR 27016 will cover the economics of information security management.
• ISO/IEC 27017 will cover information security aspects of cloud computing.
• ISO/IEC 27018 will cover privacy aspects of cloud computing.
• ISO/IEC 27031:2011 is an ICT-focused standard on business continuity.
• ISO/IEC 27032 will provide guidelines for cybersecurity.
• ISO/IEC 27033 is replacing the multi-part ISO/IEC 18028 standard on IT network security (part 1 released in 2009, rest in preparation).
• ISO/IEC 27034 is providing guidelines for application security (part 1 was released in 2011, the remainder are in preparation).
• ISO/IEC 27035:2011 on information security incident management.
• ISO/IEC 27036 guideline for security for supplier relationships.
• ISO/IEC 27037 guideline for digital evidence.
• ISO/IEC 27038 specification for digital redaction.
• ISO/IEC 27039 concerns intrusion detection and prevention systems.
• ISO/IEC 27040 guideline on storage security.
• ISO/IEC 27041 guideline on assurance for digital evidence investigation methods.
• ISO/IEC 27042 guideline on analysis and interpretation of digital evidence.
• ISO/IEC 27043 guideline on digital evidence investigation principles and processes.
• ISO 27799:2008 provides health sector specific ISMS implementation guidance based on ISO/IEC 27002.
Full Details at: http://www.CyberThreatSummit.com
“The Cyber Threat Summit 2013 is proudly brought to you by the ICTTF International Cyber Threat Task Force. This is our third year and we pride ourselves on developing an interesting, appropriate and pr...
Re-posting from a G+ post from frantic Father in the UK has had his 13 year old daughter has gone missing here is the info http://www.missingpeople.org.uk/jessicamitchell
If you can re-post to all area in the UK France and Spain as she may be
heading out of the UK with the older male she may have gone off with. The Police are investigating this. Thanks