Materials Updated / Academic publications

Blog about academic publications was recently updated.

Publications [ Academic ] Featured May 15, 2014 academic publication, ITA
ITA, cloud, cloud security STO STRATEGY May 15, 2014 academic publication,
ITA ITA, cloud, cloud security STO STRATEGY SECURITY COMPLIANCE CHALLENGES
ON CLOUDS May 15, 2014 academic publication, ITA ITA, cloud, cloud security
STO STRATEGY May 15, 2014 academic publication, ITA ITA, cloud, cloud
security STO STRATEGY May 15, 2014 academic publication, ITA ITA, cloud,
cloud security STO STRATEGY May 15, 2014 academic publication, ITA ITA,
cloud, cloud security STO STRATEGY May 15, 2014 academic publication,
I-Society, Infonomics Society I-Society, cloud, cloud security STO STRATEGY
May 15, 2014 academic publication, I-Society, Infonomics Society I-Society
, cloud, cloud security STO STRATEGY Limitations of Security Standards
against Public Clouds May 15, 2014 academic publication, I-Society,
Infonomics Society I-Society, cloud, cloud security STO STRATEGY May 15,
2014 academic publication, I-Society, Infonomics Society I-Society, cloud,
cloud security STO STRATEGY May 15, 2014 academic publication, I-Society,
Infonomics Society I-Society, cloud, cloud security STO STRATEGY May 15,
2014 academic publication, I-Society, Infonomics Society I-Society, cloud,
cloud security STO STRATEGY May 15, 2014 academic publication, ICITST,
Infonomics Society ICITST, BlackBerry, Mobile, Mobile Security, conference
STO STRATEGY May 15, 2014 academic publication, ICITST, Infonomics Society
ICITST, BlackBerry, Mobile, Mobile Security, conference STO STRATEGY
Vulnerability Elimination by Force of New Mobile OS Comparative Research of
Security Techniques on BlackBerry OS (incl. PlayBook) May 15, 2014
academic publication, ICITST, Infonomics Society ICITST, BlackBerry,
Mobile, Mobile Security, conference STO STRATEGY May 15, 2014 academic
publication, ICITST, Infonomics Society ICITST, BlackBerry, Mobile, Mobile
Security, conference STO STRATEGY May 15, 2014 academic publication,
ICITST, Infonomics Society ICITST, BlackBerry, Mobile, Mobile Security,
conference STO STRATEGY May 15, 2014 academic publication, ICITST,
Infonomics Society ICITST, BlackBerry, Mobile, Mobile Security, conference
STO STRATEGY

Source: sto-strategy.com

Materials Updated / Non-academic publications

Blog about non-academic publications was recently updated.

Publications [ Non-academic ] Featured May 15, 2014 non-academic
publication, PenTest Magazine pentest magazine, Penter Career STO STRATEGY
May 15, 2014 non-academic publication, PenTest Magazine pentest magazine,
Penter Career STO STRATEGY Pen test career. how to begin May 15, 2014
non-academic publication, PenTest Magazine pentest magazine, Penter Career
STO STRATEGY May 15, 2014 non-academic publication, PenTest Magazine
pentest magazine, Penter Career STO STRATEGY May 15, 2014 non-academic
publication, PenTest Magazine pentest magazine, Penter Career STO STRATEGY
May 15, 2014 non-academic publication, PenTest Magazine pentest magazine,
Penter Career STO STRATEGY May 15, 2014 non-academic publication,
eForensics Magazine eForensics, Forensics, mobile forensics, BlackBerry,
Android STO STRATEGY May 15, 2014 non-academic publication, eForensics
Magazine eForensics, Forensics, mobile forensics, BlackBerry, Android STO
STRATEGY State of art of mobile forensics May 15, 2014 non-academic
publication, eForensics Magazine eForensics, Forensics, mobile forensics,
BlackBerry, Android STO STRATEGY May 15, 2014 non-academic publication,
eForensics Magazine eForensics, Forensics, mobile forensics, BlackBerry,
Android STO STRATEGY May 15, 2014 non-academic publication, eForensics
Magazine eForensics, Forensics, mobile forensics, BlackBerry, Android STO
STRATEGY May 15, 2014 non-academic publication, eForensics Magazine
eForensics, Forensics, mobile forensics, BlackBerry, Android STO STRATEGY
Mar 11, 2013 non-academic publication, Groteck Business Media forensics,
mobile forensics, dead forensics, live forensics, mobile Yury Chemerkin
Mar 11, 2013 non-academic publication, Groteck Business Media forensics,
mobile forensics, dead forensics, live forensics, mobile Yury Chemerkin
Comparative Analysis on Forensics Mar 11, 2013 non-academic publication,
Groteck Business Media forensics, mobile forensics, dead forensics, live
forensics, mobile Yury Chemerkin Mar 11, 2013 non-academic publication,
Groteck Business Media forensics, mobile forensics, dead forensics, live
forensics, mobile Yury Chemerkin Mar 11, 2013 non-academic publication,
Groteck Business Media forensics, mobile forensics, dead forensics, live
forensics, mobile Yury Chemerkin Mar 11, 2013 non-academic publication,
Groteck Business Media forensics, mobile forensics, dead forensics, live
forensics, mobile Yury Chemerkin Mar 11, 2013 PenTest Magazine,
non-academic publication amazon web services, aws, cloud, security,
compliance Yury Chemerkin Mar 11, 2013 PenTest Magazine, non-academic
publication amazon web services, aws, cloud, security, compliance Yury
Chemerkin AWS Cloud Security From the Point of View of the Compliance Mar
11, 2013 PenTest Magazine, non-academic publication amazon web services,
aws, cloud, security, compliance Yury Chemerkin Mar 11, 2013 PenTest
Magazine, non-academic publication amazon web services, aws, cloud,
security, compliance Yury Chemerkin Mar 11, 2013 PenTest Magazine,
non-academic publication amazon web services, aws, cloud, security,
compliance Yury Chemerkin Mar 11, 2013 PenTest Magazine, non-academic
publication amazon web services, aws, cloud, security, compliance Yury
Chemerkin Mar 11, 2013 PenTest Magazine, non-academic publication pentest
magazine, yury chemerkin, interview Yury Chemerkin Mar 11, 2013 PenTest
Magazine, non-academic publication pentest magazine, yury chemerkin,
interview Yury Chemerkin Interview Pentest Mar 11, 2013 PenTest Magazine,
non-academic publication pentest magazine, yury chemerkin, interview Yury
Chemerkin Mar 11, 2013 PenTest Magazine, non-academic publication pentest
magazine, yury chemerkin, interview Yury Chemerkin Mar 11, 2013 PenTest
Magazine, non-academic publication pentest magazine, yury chemerkin,
interview Yury Chemerkin Mar 11, 2013 PenTest Magazine, non-academic
publication pentest magazine, yury chemerkin, interview Yury Chemerkin Feb
22, 2013 Hakin9 Magazine, non-academic publication BlackBerry Playbook,
Mobile Security Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic
publication BlackBerry Playbook, Mobile Security Yury Chemerkin Blackberry
playbook – new challenges Feb 22, 2013 Hakin9 Magazine, non-academic
publication BlackBerry Playbook, Mobile Security Yury Chemerkin Feb 22,
2013 Hakin9 Magazine, non-academic publication BlackBerry Playbook, Mobile
Security Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic
publication BlackBerry Playbook, Mobile Security Yury Chemerkin Feb 22,
2013 Hakin9 Magazine, non-academic publication BlackBerry Playbook, Mobile
Security Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic
publication BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 Hakin9
Magazine, non-academic publication BlackBerry, Mobile Security Yury
Chemerkin When developer’s api simplify user mode rootkits developing. Feb
22, 2013 Hakin9 Magazine, non-academic publication BlackBerry, Mobile
Security Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic
publication BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 Hakin9
Magazine, non-academic publication BlackBerry, Mobile Security Yury
Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic publication
BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 Hakin9 Magazine,
non-academic publication BlackBerry, Mobile Security Yury Chemerkin Feb 22,
2013 Hakin9 Magazine, non-academic publication BlackBerry, Mobile Security
Yury Chemerkin Does your black berry smartphone have ears. Feb 22, 2013
Hakin9 Magazine, non-academic publication BlackBerry, Mobile Security Yury
Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic publication
BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 Hakin9 Magazine,
non-academic publication BlackBerry, Mobile Security Yury Chemerkin Feb 22,
2013 Hakin9 Magazine, non-academic publication BlackBerry, Mobile Security
Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic publication
social network, privacy Yury Chemerkin Feb 22, 2013 Hakin9 Magazine,
non-academic publication social network, privacy Yury Chemerkin Social
Network Privacy II Feb 22, 2013 Hakin9 Magazine, non-academic publication
social network, privacy Yury Chemerkin Feb 22, 2013 Hakin9 Magazine,
non-academic publication social network, privacy Yury Chemerkin Feb 22,
2013 Hakin9 Magazine, non-academic publication social network, privacy
Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic publication
social network, privacy Yury Chemerkin Feb 22, 2013 Hakin9 Magazine,
non-academic publication social network, privacy Yury Chemerkin Feb 22,
2013 Hakin9 Magazine, non-academic publication social network, privacy
Yury Chemerkin Social network privacy. Feb 22, 2013 Hakin9 Magazine,
non-academic publication social network, privacy Yury Chemerkin Feb 22,
2013 Hakin9 Magazine, non-academic publication social network, privacy
Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic publication
social network, privacy Yury Chemerkin Feb 22, 2013 Hakin9 Magazine,
non-academic publication social network, privacy Yury Chemerkin Feb 22,
2013 Groteck Business Media, non-academic publication BlackBerry, Mobile
Security Yury Chemerkin Feb 22, 2013 Groteck Business Media, non-academic
publication BlackBerry, Mobile Security Yury Chemerkin Безопасность
BlackBerry-решений: уязвимости на стыке технологий Feb 22, 2013 Groteck
Business Media, non-academic publication BlackBerry, Mobile Security Yury
Chemerkin Feb 22, 2013 Groteck Business Media, non-academic publication
BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 Groteck Business
Media, non-academic publication BlackBerry, Mobile Security Yury Chemerkin
Feb 22, 2013 Groteck Business Media, non-academic publication BlackBerry,
Mobile Security Yury Chemerkin Feb 22, 2013 Groteck Business Media,
non-academic publication cloud, cloud security, security Yury Chemerkin
Feb 22, 2013 Groteck Business Media, non-academic publication cloud, cloud
security, security Yury Chemerkin Проблемы новых парадигм и необходимости
новых подходов к управлению облачн… Feb 22, 2013 Groteck Business Media,
non-academic publication cloud, cloud security, security Yury Chemerkin
Feb 22, 2013 Groteck Business Media, non-academic publication cloud, cloud
security, security Yury Chemerkin Feb 22, 2013 Groteck Business Media,
non-academic publication cloud, cloud security, security Yury Chemerkin
Feb 22, 2013 Groteck Business Media, non-academic publication cloud, cloud
security, security Yury Chemerkin Feb 22, 2013 Hakin9 Magazine,
non-academic publication forensics, mobile forensics, Android, BlackBerry
Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic publication
forensics, mobile forensics, Android, BlackBerry Yury Chemerkin Comparison
of android and black berry forensic techniques Feb 22, 2013 Hakin9 Magazine
, non-academic publication forensics, mobile forensics, Android,
BlackBerry Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic
publication forensics, mobile forensics, Android, BlackBerry Yury Chemerkin
Feb 22, 2013 Hakin9 Magazine, non-academic publication forensics, mobile
forensics, Android, BlackBerry Yury Chemerkin Feb 22, 2013 Hakin9 Magazine
, non-academic publication forensics, mobile forensics, Android,
BlackBerry Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic
publication social network, privacy Yury Chemerkin Feb 22, 2013 Hakin9
Magazine, non-academic publication social network, privacy Yury Chemerkin
Social network privacy guide Feb 22, 2013 Hakin9 Magazine, non-academic
publication social network, privacy Yury Chemerkin Feb 22, 2013 Hakin9
Magazine, non-academic publication social network, privacy Yury Chemerkin
Feb 22, 2013 Hakin9 Magazine, non-academic publication social network,
privacy Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic
publication social network, privacy Yury Chemerkin Feb 22, 2013
non-academic publication, Hakin9 Magazine Yury Chemerkin Feb 22, 2013
non-academic publication, Hakin9 Magazine Yury Chemerkin Interview with
Yury Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine Yury
Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine Yury
Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine Yury
Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine Yury
Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine
BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 non-academic
publication, Hakin9 Magazine BlackBerry, Mobile Security Yury Chemerkin
When developer’s api simplify user mode rootkits developing Feb 22, 2013
non-academic publication, Hakin9 Magazine BlackBerry, Mobile Security Yury
Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine
BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 non-academic
publication, Hakin9 Magazine BlackBerry, Mobile Security Yury Chemerkin
Feb 22, 2013 non-academic publication, Hakin9 Magazine BlackBerry, Mobile
Security Yury Chemerkin Feb 22, 2013 non-academic publication, Hakin9
Magazine forensics, mobile forensics, blackberry Yury Chemerkin Feb 22,
2013 non-academic publication, Hakin9 Magazine forensics, mobile forensics
, blackberry Yury Chemerkin To get round to the heart of fortress Feb 22,
2013 non-academic publication, Hakin9 Magazine forensics, mobile forensics
, blackberry Yury Chemerkin Feb 22, 2013 non-academic publication, Hakin9
Magazine forensics, mobile forensics, blackberry Yury Chemerkin Feb 22,
2013 non-academic publication, Hakin9 Magazine forensics, mobile forensics
, blackberry Yury Chemerkin Feb 22, 2013 non-academic publication, Hakin9
Magazine forensics, mobile forensics, blackberry Yury Chemerkin Feb 22,
2013 non-academic publication, Hakin9 Magazine BlackBerry, Mobile Security
Yury Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine
BlackBerry, Mobile Security Yury Chemerkin Does your black berry smartphone
have ears Feb 22, 2013 non-academic publication, Hakin9 Magazine
BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 non-academic
publication, Hakin9 Magazine BlackBerry, Mobile Security Yury Chemerkin
Feb 22, 2013 non-academic publication, Hakin9 Magazine BlackBerry, Mobile
Security Yury Chemerkin Feb 22, 2013 non-academic publication, Hakin9
Magazine BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013
non-academic publication, Hakin9 Magazine BlackBerry, Mobile Security Yury
Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine
BlackBerry, Mobile Security Yury Chemerkin Why is password protection a
fallacy a point of view Feb 22, 2013 non-academic publication, Hakin9
Magazine BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013
non-academic publication, Hakin9 Magazine BlackBerry, Mobile Security Yury
Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine
BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 non-academic
publication, Hakin9 Magazine BlackBerry, Mobile Security Yury Chemerkin
Feb 22, 2013 non-academic publication, Hakin9 Magazine BlackBerry, Mobile
Security Yury Chemerkin Feb 22, 2013 non-academic publication, Hakin9
Magazine BlackBerry, Mobile Security Yury Chemerkin The Backroom Message
That’s Stolen Your Deal Feb 22, 2013 non-academic publication, Hakin9
Magazine BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013
non-academic publication, Hakin9 Magazine BlackBerry, Mobile Security Yury
Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine
BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 non-academic
publication, Hakin9 Magazine BlackBerry, Mobile Security Yury Chemerkin
Feb 22, 2013 Yury Chemerkin Feb 22, 2013 Yury Chemerkin Is Data Secure On
The Password Protected Blackberry Device Feb 22, 2013 Yury Chemerkin Feb
22, 2013 Yury Chemerkin Feb 22, 2013 Yury Chemerkin Feb 22, 2013 Yury
Chemerkin Feb 22, 2013 Yury Chemerkin Feb 22, 2013 Yury Chemerkin A
Security System That Changed The World Feb 22, 2013 Yury Chemerkin Feb 22,
2013 Yury Chemerkin Feb 22, 2013 Yury Chemerkin Feb 22, 2013 Yury Chemerkin

Source: sto-strategy.com

EMM as a Security Approach – Part III. Forensics achievements

See on Scoop.itSTO_STRATEGY

Is that really difficult to access application data ? We definitely know
that forensics techniques have been good to find certain tracks on mobile
phone. So, what capabilities does it provide in the scope of applications?
Here we go with solutions like Elcomsoft, Oxygen Forensics, Via Forensics
and so on

See on sto-strategy.com

CYBER INTELLIGENCE EUROPE 2014

See on Scoop.itSTO_STRATEGY

With the ever growing threat of cyber-attacks on government critical
infrastructure there is no better time to come together and discuss the
latest threats being seen to breach public sector computer systems.
European governments are now working together and with the private sector
to strengthen their defence.

See on sto-strategy.com

Daily Cyber News 05/24/2014

See on Scoop.itIT SEC TOOLS

IT pro gets 4 years in prison for sabotaging ex-employer’s system

“A former network engineer for oil and gas company EnerVest has been
sentenced to four years in federal prison after pleading guilty in
January to sabotaging the company’s systems badly enough to disrupt its
business operations for a month. Ricky Joe Mitchell of Charleston, West
Virginia, must also pay $428,000 in restitution and a $100,000 fine,
according to an announcement this week from U.S. Attorney Booth
Goodwin’s office. In June 2012, Mitchell found out he was going to be
fired from EnerVest and in response he decided to reset the company’s
servers to their original factory settings. He also disabled cooling
equipment for EnerVest’s systems and disabled a data-replication
process.”


http://www.esecurityplanet.com/network-security/network-engineer-gets-four-year-prison-sentence-for-attack-on-former-employer.html

Data Breach at American Institutes for Research Exposes 6,500 Employees’
Info

“About 6,500 current and former employees of the American Institutes
for Research (AIR) may have had unencrypted information – including
Social Security numbers and payment card information – compromised
after unauthorized access was gained to one of the organization’s
servers.
How many victims? About 6,500.
What type of personal information? Social Security numbers and payment
card information is among the unencrypted data that was compromised.
What happened? Unauthorized access was gained to an AIR server that
contained the information.
What was the response? AIR brought on a digital forensics firm to carry
out an investigation. All impacted employees are being notified and
offered a free year of credit monitoring services.
Details: AIR learned of the incident on May 12. Notification letters
are dated May 14. The breach impacted business systems, and student and
client information was not affected.
Quote: “At this point, we have no evidence that any information was
accessed or misused,” according to a notification letter from David
Myers, president and CEO of AIR”


http://blogs.edweek.org/edweek/DigitalEducation/2014/05/data_breach_at_major_k-12_rese.html

Visa, MasterCard renew push for chip cards

“Visa and MasterCard are renewing a push to speed the adoption of
microchips into U.S. credit and debit cards in the wake of recent
high-profile data breaches, including this week’s revelation that
hackers stole consumer data from eBay’s computer systems.
Card processing companies argue that a move away from the black
magnetic strips on the backs of credit cards would eliminate a
substantial amount of U.S. credit card fraud. They say it’s time to
offer U.S. consumers the greater protections microchips provide by
joining Canada, Mexico and most of Western Europe in using cards with
the more advanced technology.
Chips aren’t perfect, says Carolyn Balfany, MasterCard’s group head for
U.S. product delivery, but the extra barrier they present is one of the
reasons criminals often choose to target U.S.-issued cards, whose
magnetic strips are easy to replicate.”

http://news.yahoo.com/visa-mastercard-renew-push-chip-181248195.html

eBay, Security Experts Say Database Dump is Fake

“Security experts and eBay have confirmed that a recent user database
being advertised on Pastebin was not obtained as a result of the data
breach suffered by the online marketplace earlier this year.
On May 21, eBay admitted that its corporate network had been breached
sometime between late February and early March 2014. The attackers
compromised the login credentials of a small number of employees and
used the data to gain access to the details of eBay’s 145 million
customers. The breach was discovered only in early May.
While there’s no evidence that financial information has been
compromised, or that PayPal customers are impacted, the cybercriminals
have managed to gain access to names, email addresses, physical
addresses, phone numbers, dates of birth and encrypted passwords.
It’s uncertain who is behind the attack, but other cybercriminals and
scammers are already trying to profit from the incident. Experts have
reported seeing a higher number of PayPal and eBay phishing attacks,
and, a post on Pastebin was found offering to sell 145,312,663 eBay
customer records for 1.453 Bitcoin (around $750).”

http://www.securityweek.com/ebay-security-experts-say-database-dump-fake

See on sto-strategy.com

ICS-CERT: U.S. Public Utility Hacked

See on Scoop.itIT SEC TOOLS

Reuters reports that the U.S. Department of Homeland Security (DHS) has
acknowledged that an unidentified public utility in the U.S. was recently
compromised by a sophisticated hacker group.

In a report [PDF], DHS’ Industrial Control Systems Cyber Emergency Response
Team (ICS-CERT) explained that the software used to mange the utility’s
control system was accessible via the Internet. “The systems were
configured with a remote access capability, utilizing a simple password
mechanism; however, the authentication method was susceptible to compromise
via standard brute forcing techniques,” the report states.

An ICS-CERT investigation found that the system had been breached
previously, and worked with the utility’s owners to evaluate the overall
security of their infrastructure and to make practical recommendations for
securing the control network.

ICS-CERT Monitor Jan-April2014

See on sto-strategy.com

Security Tools News

See on Scoop.itIT SEC TOOLS

Encrypted File Scanner v1.6 is the free tool to quickly scan and discover
all the secret Encrypted files on Windows system.

http://securityxploded.com/encrypted-file-scanner.php

 

LDAP Password Kracker v2.0

LDAP Password Kracker is a free tool to recover the lost password from any
LDAP Directory Server. It supports password recovery over normal LDAP (port
389) as well as LDAP SSL (port 636) protocol.

http://securityxploded.com/ldap-password-kracker.php

See on sto-strategy.com

CYBER SECURITY FOR OIL AND GAS | June 18- 18, 2014 | Houston, Texas

See on Scoop.itSTO_STRATEGY

IQPC 2nd Annual Cyber Security for Oil and Gas Summit  will address the
major cyber security issues facing the oil and gas industry as a whole and
will provide a platform for IT and cyber security professionals to share
their wisdom, experience, and thoughts on the future of this complex and
often unknown threat to their enterprises.

For more information on speakers view brochure here (http://bit.ly/1c22jw1
)

Don’t forget to mention promo code CYBER_HAKIN to receive a 20% DISCOUNT!

See on sto-strategy.com