Web spoofing allows an attacker to create a “shadow copy” of a website. Accesses to the shadow Web are funneled through the attacker’s machine, allowing the attacker to monitor all of the victim’s activities including any passwords or account numbers the victim enters. In short, the attacker observes and controls everything the victim does on the Web.
Click here->Web Spoofing White Paper
Open-Source Security Testing Methodology Manual
ISECOM, the Institute for Security and Open Methodologies is a Non-Profit Organization seeking to exceed international legislation and regulations regarding security as well as those from many participating organizations to assure compliance.
Click here-> ISECOM Manual | ISECOM Website
Securing Your Web Browser
This paper will help you configure your web browser for safer internet surfing. It is written for home computer users, students, small business workers, and any other person who works with limited Information Technology (IT) support and broadband (cable modem, DSL) or dial-up connectivity
Click here->Securing Your Web Browser
Security And Near Field Communications
Near field communication, abbreviated NFC, is a form of contactless communication between devices like smartphones or tablets. Contactless communication allows a user to wave the smartphone over a NFC compatible device to send information without needing to touch the devices together or go through multiple steps setting up a connection. Click on the link below to see what the security risks are.
Click here->Security Risks With Near Field Communications
Vendor Security Advisories
Click here->Cisco Security Advisories
Click here->Microsoft Security Advisories
Click here->Oracle Database Patches
Click here->Adobe Patches and Updates
Click here->VMware Security Advisories
Computer Security News Sites
SecurityFocus.com is designed to facilitate discussion on security related topics, create security awareness, and to provide one of the Internet's largest and most comprehensive database of security knowledge and resources to the public.
The Cyberwire is a free, community-driven cyber security news service based in Baltimore, MD. Their mission is to provide a relevant and intelligently organized daily digest of the critical news happening across the global cyber security domain.
This is a nice site that keeps track of the latest viruses, threats and vulnerabilities.
Government Computer Security Sites
Computer Crime and Intellectual Property Section
CCIPS focuses exclusively on the issues raised by computer and intellectual property crime. They advise federal prosecutors and law enforcement agents; comment upon and propose legislation; coordinate international efforts to combat computer crime; litigate cases; and train all law enforcement groups.
United States Computer Emergency Readiness Team (US-CERT) is a partnership between the Department of Homeland Security and the public and private sectors. Established in 2003 to protect the nation's Internet infrastructure, US-CERT coordinates defense against and responses to cyber attacks across the nation.
Click here-> http://www.us-cert.gov/
Founded in 1901, NIST is a non-regulatory federal agency within the U.S. Department of Commerce. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.
Click here-> http://csrc.nist.gov/index.html
National Vulnerability Database
The NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance
Latest Cyber Security News
IDP, LLC / www.idpnow.net © 2014