On Day 27 of the 2010 version of Cyber Security Awareness Month we want your view on the use of social media in the office.
Other Resources: Another good resource when creating your Social Media policy is "Ten things you should cover in your social networking policy" -- Rick Wanner - rwanner at isc dot sans dot org - http://namedeplume.blogspot.com/ - Twitter:namedeplume (Protected) |
Rick 324 Posts ISC Handler Oct 28th 2010 |
Thread locked Subscribe |
Oct 28th 2010 1 decade ago |
What kind of effect would a Attribution Market have on the current real world situation? How willing would parties be to reveal intelligence on cyber actors if they were paid? How disruptive would revelation of HIGH profile attacks be, and revelation of the actors behind HOLY SHEET attacks be that the public had no clue about?
Hrm.... No actor can effectively pursue a mission when he has been turned into a Paris Hilton... No nation likes its dirty acts revealed to the light of the world.. No nation likes to be Shamed for shoddy ass kindergarden OPSEC. Silly Dragons, Cybers for Ninjas. |
Anonymous |
Quote |
Oct 28th 2010 1 decade ago |
Are we aware of this:
Former participants of Swiss Cyber Storm 2 have convered the LiveHttpHeader firefox plug-in into an observation plugin (2009). However - the wargame observation plugin wargame seems to be obsolete - because Toorcon showed up with Freesheep - a similar approach to steal web sessions - even in Social Media! Watch out for malicious firefox plugions http://www.darknet.org.uk/2010/10/firesheep-social-network-session-stealinghijacking-tool/ Have a safe day |
MGuirao 13 Posts |
Quote |
Oct 30th 2010 1 decade ago |
Sign Up for Free or Log In to start participating in the conversation!