Welcome to SecurityDocs

A collection of 7,815 IT security white papers, carefully curated by professionals like yourself

Car Hacking: You Cannot Have Safety without Security

by Pierluigi Paganini Oct. 7, 2017 via INFOSEC Institute

The theme of the car hacking is increasingly discussed by the media and within the security community. At one time, the exploits of hackers that have hijacked a car were the subject of movie scenes. Today they are a disturbing reality that we discuss in this article. One of the effects of the massive introduction of technology in our vehicles is car hacking. The term refers to the possibility that a hacker can compromise some of the technological components within our cars. Modern cars cont...

Security Predictions for 2014

by Prateek Gianchandani Oct. 7, 2017 via INFOSEC Institute

As the year 2013 draws to a close, we decided to make some predictions for the most popular Security Trends in 2014. Here is what we think are the major points that will determine the determine the Security Landscape in the coming year. Big Boom in Mobile Security Security is catching up to mobile fast. We are in the post PC revolution and with the rise in the number of people using Smartphones, most of the information that we have is available to us anytime in the palm of our hand. In 2014...

InfoSec Institute Interview: Sumit Sharma

by D12d0x34X Oct. 7, 2017 via INFOSEC Institute

Sumit Sharma happens to be the co-founder of Ethical Hacking forum, Hackers Garage. Sumit recently gave talk at NullCon Goa entitled “Capturing Zero-Day Information”, by leveraging on honeypots. So Sumit how long you have been working on this stuff? I have been into IT security for past 5+ years with 4 years of Penetration Testing experience. You also happen to be a member of the IndianHoneynet Project.Tell us about it. The Indian Honeynet Project (IHN) is aimed towards researching worms...

The FBI TOR Exploit

by Warlock Oct. 7, 2017 via INFOSEC Institute

The Tor network is an anonymizing network that allows people to browse the web and access other services without being traced. As part of this network, there is the so-called “darknet,” servers accessible only through Tor, which host a variety of services from forums to e-mail. It does this by directing Internet traffic through a volunteer network of more than 3,000 relays to conceal the user’s location. While many of these services are innocent and aimed at those concerned about human right...

Securing IPv6

Oct. 6, 2017 via ADMIN Magazine

In 1995, the Internet Engineering Task Force (IETF) chose IPv6 as the successor to IPv4. Initially, this was not an issue that raised much interest. But this changed when Microsoft added IPv6 support to its Windows Vista and Windows Server platforms in 2007. Linux in all its variants and Apple’s Mac OS X followed suit; thus, the new protocol spread with each new installation. On all of these computers today, IPv6 is active by default, communicating in unsolicited dual-stack operations using I...

IT Guidance for Your Legal Team

by Brad Ruppert Oct. 2, 2017

This paper will discuss how an Information Security team should interface with their legal team to ensure both groups remain focused on what they do best. Working with the legal team can often be a drawn-out, overly documented process which might be simplified if they had the right tools and training to gather the information themselves. In today’s world e-discovery is a huge component when dealing with any type of litigation so it would be of everyone’s benefit that the tool used to col...

Government Surveillance

by Kevin McCoy Oct. 1, 2017 via Infosecwriters

In the beginning, the National Security Agency (NSA) was founded November 8, 1952 and headquartered at Fort George G. Meade, Maryland. The agency is tasked with collecting and processing foreign intelligence to help with military operations (“FAQs”). A primary objective of the agency has always been cryptanalysis as part of its foreign intelligence operations. The agency still seeks to collect information on foreign nations in today’s world, however it now also concentrates its efforts on mon...

The 2014 Sony Pictures Hack: Theories of the Truth

by Mikal Chavez Oct. 1, 2017 via Infosecwriters

Many users in today’s society are precarious about the topic of information security while exploring the depths of the virtual world. Fortunately, there are pre-configured layers of security provided by default via the operating systems firewall. However, how much protection do we truly believe the manufacturers and service providers offer in the terms of safeguarding our personal information?

A DIY Guide for those without the patience to wait for whistleblowers

Oct. 1, 2017 via Infosecwriters

'm not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz it took to 0wn Gamma. I'm writing this to demystify hacking, to show how simple it is, and to hopefully inform and inspire you to go out and hack shit. If you have no experience with programming or hacking, some of the text below might look like a foreign language. Check the resources section at the end to help you get started. And trust me, once you've learned the basics you'll realize this really is easier than f...

Regulations and Technologies to Reduce Breaches in Computer Networks

by Ming-Li Tabor Oct. 1, 2017 via Infosecwriters

From the records, there are more hackers attacking computer network systems. The systems include banks, companies, and hospitals. Millions of records were breached and billions of dollars were lost. The government regulations require data breach notification. According to Title II of the Communications Act of 1934, Internet service providers are liable to their customers. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) protects health information. Magnetic strip techno...

Are Companies Really Protecting Consumer Information

by Carl Brackett Oct. 1, 2017 via Infosecwriters

Technology has changed through the years and has affected the way items are purchased, whether it is online or at conventional stores. Cash or check is not the only means of paying for a purchase as people have started taking advantage of debit or credit cards since they are suppose to be safer than carrying cash. The real question that comes to mind, are people really safer using a debit or credit card?

How the Lizard Squad Took Down Two of the Biggest Networks in the World

by James Rollins Oct. 1, 2017 via Infosecwriters

During the 2014 Christmas holidays, millions of people all over the world were subjected to an unwanted gift. They sat down to play their new video game or watch a streaming movie on their Microsoft X-Box or Sony PlayStation, only to find that the online services of their respective system was unavailable. The blackout lasted for a couple days in Microsoft’s case, but the Sony service was down for more than a week. Microsoft’s X-Box Live and the Sony PlayStation Network had been successfully ...

Bring Your Own Devices in Business and Education

by Theresa Meza Oct. 1, 2017 via Infosecwriters

Companies have developed policies, procedures, and guidelines to manage the information security of the computers that are provided to employees but now they must go beyond that realm. Today’s world has seen the abundant increase of mobile devices that are used on a regular basis by all people. Employees are now bringing these mobile devices to the workplace and are using them to perform work as well as access company networks and information. The management of these employees’ own devices mu...

Best Practices for Protecting Consumer Data

by Jillena Locklear Oct. 1, 2017 via Infosecwriters

The field of information technology (IT) has grown extensively in the past few decades. This growth can be attributed to the advancement of technology and the impact that new technology has had on consumerism. Technology has developed a new avenue for societal consumers. The World Wide Web (Internet) alone has paved the way for consumers to enjoy the comforts of their home and make purchases online avoiding the hustle and bustle of common crowds at malls and other various retail centers. Othe...

The Necessity of Information Security Management in the Vulnerable Pharmaceutical Industry

by Shawn J. Roberts Oct. 1, 2017 via Infosecwriters

The pharmaceutical industry produces billions of dollars in sales each year. The industry is evolving and relying on using technology more and more to conduct day-to-day business. The pharmaceutical industry generates enormous amounts of sensitive and private information such as medical records, employee information, financial data and research data. This makes the pharmaceutical industry vulnerable to cybercrime. The pharmaceutical industry has a big responsibility to stakeholders, patien...

Vendor Verification: Boosting Consumer Confidence in E-Commerce

by Thomas Stroud Oct. 1, 2017 via Infosecwriters

The purpose of this paper is to propose a new method for verifying the identities of vendors in electronic transaction processing as it relates to consumer confidence in e-commerce. Current problems plaguing consumers in the private sector will be discussed with particular attention given to ransomware and similar unwanted programs. This is followed by a discussion of the Secure Electronic Transaction protocol, which provides a framework for vendor verification, andoffers one potential solu...

Managing Internet of Thing Devices

by Luke Blum Oct. 1, 2017 via Infosecwriters

The proliferation of network capable devices, collectively known as the Internet of Things, has provided the unprecedented opportunity for owners to manage and control their devices at any time and from any place. These devices are significantly different from the traditional computing devices that most people are accustomed to. Often smaller in size with limited processing resources, unique protocols were needed to allow these devices to operate effectively.

New Technology in the Armed Forces

by Robert Sauls Oct. 1, 2017 via Infosecwriters

The United States Armed Forces is the main line of defense to protect our country from the threats of the world. If the armed forces are not well equipped, our soldiers can not fight and protect their country. With the advancements in technology, the armed forces have acquired many advanced weapons and vehicles to use to fight these threats to our country. Throughout this paper, I will discuss new advancements in weapons, vehicles, and other technology that the armed forces use to fight the e...

Hospitality IT Security

by Charles Hornat Oct. 1, 2017 via Infosecwriters

This paper outlines some of the many IT security issues I have witnessed when taking over hotel/resort IT and security. These security lapses often times leave guest information free and open for the taking, usually requiring little to no effort to obtain. In my company’s experience (over a decade) of supporting some of the most prestigious hotels in the world, we see many of the same issues time and time again and I outline some of the more common issues we have come across.

The Emerging Trend of Wearable Technological Devices

by Brian Kyle Marek Oct. 1, 2017 via Infosecwriters

Wearable Technology is a growing trend in the fitness market. The technology used in this emerging field has led to the wearable technology industry expanding into multiple sectors. While the current market of such devices is focused primarily around fitness, there is potential for significant growth and development in other areas, including the medical and business world.

Subscribe

We'll send you a carefully curated list of the best IT security white papers to your mailbox every Friday.