Cisco Blogs

Search Results

308 posts found

Cisco Annual Security Review

…cash and why this might be a weak link in the chain. What is a Money Mule?, ‘Money Mules’ Help Haul Cyber Criminals’ Loot Brian Krebs:FBI: Cyber crooks stole $40M from U.S. small, mid-sized firms Money Mules help haul Cyber Criminal Loot The Zeus Money Mules Five Alleged Money Mules indicted 419 Scam Segment 6: Security Services Learn what the hundreds of hard-working folks in Cisco Security Intelligence Operations (SIO) are d…

Read More >>

Tags: , , , ,

Take the SBA-Train

…og about SEO poisoning, he provides some good tips for avoiding the threats inherent in that particular brand of cyber threats. One of his suggestions is, of course, to get Ironport Web Security. Within the SBA subway system, as you navigate through the Supplemental guides, you find a Web Security subway stop. When you follow that to the Web Security SBA guide, you find a mini map like below, which shows you what you’re about to look at, what you…

Read More >>

Tags: , , , ,

The 10 most common security threats explained

…usic Entertainment was secretly installing a rootkit when users copied the CD onto their computers. At the time, security expert Bruce Schneier warned that the rootkit could allow a hacker to “gain and maintain access to your system and you wouldn’t know it.” These are perhaps the most common security terms you’ll come across to describe the different methods cybercriminals use. You can find more useful information about securi…

Read More >>

Connect Africa: Approaching the Halfway Point

By Howard Baldwin, Contributing Columnist A century ago, Africa was looked upon as a continent with great resources. All the great European powers cast imperialistic eyes across its vast landscape. Today, the story has shifted. Africa still has vast resources and potential, but efforts to capture these capabilities and resources are primarily in the hands of Africans themselves, and they are working to “mobilize the human, financial and t…

Read More >>

Tags: , , , , , ,

Call for Speakers – FIRST Security Conference 2011, Vienna

…nd that lead to learning experiences. Lastly, we are interested in presentations focusing on the monetization of cybercrime. Topics of interest include, but not limited to: Cybercrime Case Studies Mobile Threats & Technologies Video The Cloud — tech releases & case studies DNS Security Targeted Attacks — specifically real world defenses & APT response Incident Response & Management — best practices Errors in Response IPv6 Appl…

Read More >>

Tags: , , , ,