College students hijack $80 million yacht with GPS signal spoofing

A GPS spoofing project shows how easy it could be to take control of very powerful equipment.

A group of students at the University of Texas at Austin built and successfully tested a GPS spoofing device to remotely redirect an $80 million yacht onto a different route, the Houston Chronicle reports. The project, which was completed with the permission of the yacht’s owners in the Mediterranean Sea this past June, is explained in the video below.

Read more…

Advertisements
Categories: Uncategorized

Windows XP’s countdown to retirement: T-minus 500 days

November 27, 2012 Leave a comment

Microsoft is putting the 11-year-old operating system out to pasture in another year and a half and it means it. So get moving.

We are now less than 500 days from the end of support for Windows XP Service Pack 3 and Office 2003. Looking at the size of the existing XP population, that makes me rather nervous.

Read more…

Categories: Uncategorized

iSecureNet Releases Cloud-S2 Logo This Weel – A revolutionay concept in the Cloud Storage

November 20, 2012 Leave a comment

In today’s world, employees and partners need anytime, anywhere, any device access to the Data to get the job done. Businesses need to make sure that the same information is secure, compliant and in control. Current products do not deliver what employees and businesses need. Employees are turning in record numbers to public clouds to access, share and synch corporate data; but is the data secure? Absolutely not!

Many businesses also store information in a local collaboration solution, but is that easy to access? Not at all. What businesses and employees need is a safe, secure, easy-to-use solution that delivers visibility and control, while still providing anytime, anywhere, any device access to the latest information employees need to get the job done.

For more information visit http://isecurenet.in/CloudS2/CloudS2.aspx

Categories: :bastionNUX: News

Cloud S2 – On-premise easy Cloud based Storage and File Transfer for Organizations

November 15, 2012 2 comments

Email is still the dominant way to send information from one person to another. But when lots of big files are being sent, email servers can quickly start feeling the pressure, leading to degraded performance and network bandwidth strain.

This is what the managed file transfer (MFT) business addresses. Bypassing email servers, these systems are dedicated to transferring large files within organizations, between businesses and customers, or in business-to-business or application-to-application transactions. Email newsletters many times use MFTs to blast users about the latest news or promotions from their company. Financial institutions that send large numbers of documents to customers and other business partners may use MFT, too.

Read more…

Categories: Uncategorized

Five Fake Emails To Avoid

November 21, 2011 Leave a comment

Information Security Awareness Tips

 

Five Fake Emails To Avoid

 

Categories: Information Security

Structured Security For Email And Web – Protect Business From Malware

August 15, 2011 Leave a comment

Financial motives are triggering a massive explosion of malware variants and spam designed to evade traditional signature-based detection mechanisms.

In the early days, it was all about the destructive nature of viruses. Today, however, IT management must contend with highly sophisticated spyware. Keyloggers, rootkits and Trojans are the fundamental building blocks of third generation malware that is delivered via spam and infected Web sites. The number of possible variants created for this malware is unlimited and is contributing to exponential growth that is clogging both computers and networks.

Read more…

Categories: Network Security

Understanding and Selecting a Data Loss Prevention Solution –PART II

August 4, 2011 Leave a comment

This is a multipart series on the DLP and how to select DLP solutions which would fit according to your organization need. The series will conclude with solutions and recommendations on where we might all go next. In the first part we have seen and understood DLP solution their features and how content analysis is being performed. In this part we will see content analysis technique and how to protect Data which is in motion, at rest and in use.

Once the content is accessed, there are seven major analysis techniques used to find policy violations, each with its own strengths and weaknesses.

Read more…

Categories: Network Security