Invite to discuss

Brent Hutfless

Want to do away with passwords? Avoid biometrics.

In the Mission Impossible and James Bond movies, finding ways to bypass biometric‍ security systems often requires covert or gruesome acts to collect the needed fingerprints, retina, iris, or palm used by an identity scanner protecting some incredible secret. Plots involve a disk or USB drive containing the identities of hundreds or even thousands of deep cover agents or intelligence perso… Read more
14
8
Write a comment...
John Lapeyrouse
Perhaps the next "factor" should be, (and is recognized by someone that is already on the inside), a cyber peephole. When you ring my doorbell, I grant or reject your access. If I find you climbing in the upstairs window, there would be severe consequences, I am not just going to escort you out!
3
Campbell Milton
Bring in a writer from a Movie studio, I am sure that a Biometric method could be devised that read either DNA or even degraded tissue samples given known health problems that assume a rate of plaque build up causing ( name your disease). If health data is the most stolen or compromised data, then this is a partial problem, but if used with a token, then possible biometric methods are just a matt… Read more
1
Guurhart

Resource: OSINT tools and how you learn how to use them

I hope this will become a useful resource for Open-source Intelligence (OSINT)‍ and to find and learn how to use osint tool‍s. Chapter 1: Data gathering‍ for intelligence purposes Chapter 2: Link analysis Chapter 3: Other data analysis Chapter 1: Data gathering‍ for intelligence purposes With just cursory mention, any social media website such as Facebook, Twitter and… Read more
9
4
Write a comment...

Whiskeysamurai7

Whiskeysamurai7
This is a solid list. Thank you for putting this together. I will come back to this list and let you know what tools im using
2
1

Beny. Bertin

Beny. Bertin
Thank you. Usefull ressource.
1
Peerlyst
Swift hopes daily reporting will help stem payment fraud

Swift hopes daily reporting will help stem payment fraud

Swift is introducing a new reporting system to help banks identify fraudulent payments made over its financial transfer network -- but the reports will arrive up to a day too late to stop them. Over the last year, cybercriminals have hacked systems at a number of banks, using their credentials to issue fraudulent payment instructions over the Swift network.

2
Write a comment...
Write a comment...
Peerlyst

A list of the best cybersecurity podcasts

Of course first and foremost on this list of cybersecurity related podcasts‍ is the BSides Las VegasBSidesLV Radiopodcast, proudly sponsored by Peerlyst‍: Note that this list is NOT ranked, it's merely numbered to count the many good Infosec podcasts out there! In English: The BSidsesLV Radio podcast is focused on news around Security BSides conferences and t… Read more
8
5
Write a comment...
Claus Cramon Houmann
Edit: Added a note that this list is not ranked merely numbered.

Darrell Drystek

Darrell Drystek
The CERT podcast series covers a wide range of security topics and can be found at http://www.cert.org/podcasts/
2
1
Peerlyst
Password Reuse: Don't Mix Business With Personal - Dark Reading

Password Reuse: Don't Mix Business With Personal - Dark Reading

Employee education, password managers, and multifactor authentication can reduce the risk of a personal breach becoming a corporate security event. You join a social network, file-sharing service, or other online service, and of course get asked for a password. You're busy, so you quickly type in one of your existing passwords, maybe even planning to change it later.

1
Write a comment...
Arnold Reinhold
Employee education is all well and good, but it can only reduce the percentage of people who reuse passwords, not eliminate the risky behavior entirely. Attackers need to find only one reuser to gain a foothold into a corporate system. We need better ways to store password validation data so that data breeches do not result in compromised passwords.