Homeland Security Degrees

Homeland Security Degrees

The United States of America takes its national security very seriously. Since 9/11, terrorism has heightened across the globe and threatened the lives of many – including our vey own. These threats are often times attributed to military conflicts with other countries, and to...

Showing all posts tagged "Uncategorized"

GE Brings Predix Industrial Platform to Microsoft Cloud | Homeland Security Degrees

GE Brings Predix Industrial Platform to Microsoft Cloud | Homeland Security Degrees

https://homelandsecurityedus.wordpress.com/2016/07/15/ge-brings-predix-industrial-platform-to-microsoft-cloud/





GE and Microsoft unveiled a new partnership this week that will make GE’s Predix platform for the Industrial Internet available on Microsoft’s Azure cloud platform.



read more













http://feeds.feedburner.com/~ff/Securityweek?…;

To learn more visit: SecurityWeek RSS Feed

This Week in Storage: There is More Than One Path to the Cloud



EMC was in the storage news a lot this week. As the Internet of Things, or the Industrial Internet, continues to shift the conversation away from Big Data to Bigger Data aka our Data Revolution — storage plays a very important role in that narrative. Equally important is the cloud and how it will impact storage. From Microsoft’s very vocal desire to own the cloud and EMC and GE’s goal to control the growing Internet of Things market, the shuffling that is happening on the chess board is about as easy to stay current with as Amanda Bynes.



Microsoft Server 2012 R2 a Step Toward Data Center Dominance?



Microsoft is making no secret of its ambition to “own the data center of today and the cloud of tomorrow,” writes Wikibon Analyst, Founder and Managing Consultant of the 1610 Group, and former CIO Scott Lowe in his latest Wikibon Professional Alert. The new Windows Server release requires a rethinking of IT strategy toward Microsoft updates. Rather than a service pack, this is a full new release, obviating the strategy of putting off offering new services based on Microsoft updates until the full service pack comes out.



EMC + Internet of Things : Interview with Chuck Hollis



The Industrial Internet is in. Contextualizing the promise of Big Data, this new trend around our buzzing, blinking connected devices, the Internet of Things, is expected to become big business. As part of my storage profiles series this month, we hear from Chuck Hollis, VP of Global Marketing CTO for EMC. Hollis gives us the inside scoop on his EMC’s vision of this blossoming market underlying the Internet of Things.



Hadoop Is Now an Ecosystem : Brings All Data Together + Makes it Accessible | #IndustrialCloud



Edd Dumbill, VP Strategy, Silicon Valley Data Science, discussed the big shifts in industrial Internet, Big Data, and data science with theCUBE co-hosts Dave Vellante and John Furrier, live at the GE Industrial Internet event. GE still has a long way to go, but Dumbill pointed out that what they are succeeding in bringing from the consumer industry is not just the data analysis, it’s also the ability to move data quickly.



Kim Dotcom Rages as Megaupload Files Wiped Clean by Leaseweb & LeaseWeb Hits Back At Kim Dotcom Over Megaupload Deletion



According to Dotcom, LeaseWeb’s decision amounted to the “largest data massacre in the history of the internet,” and was made even worse because the Dutch hosting company apparently gave him no warning of what it was about to do. Clearly someone isn’t telling the whole truth, but it’s difficult to say who. On the one hand, it’s hard to believe that Dotcom would have made a big issue out of this had he already known the data was going to be deleted — and moreover, why would he only make a fuss about it now if he had any knowledge of what was going down? But the again, why would LeaseWeb, a company whose entire business depends on its customer’s trust, do something to jeopardize that — in particular to someone as vocal as Kim Dotcom?



ScaleIO’s Quick Sale to EMC Aids Software-Led Storage Goals to Compete Against AWS with Service Providers



ScaleIO, an Israeli startup, has been purchased by EMC for a reported 0-0 million. ScaleIO positions against Amazon’s Elastic Block Storage (EBS), and ScaleIO there’s is the ECS solution. It fixes a hole in EMC’s overall storage solution, software. The quality, speed and elasticity of cloud computing continues improve. Small and medium-sized businesses are moving to cloud hosting infrastructures (AWS, GCE, IBM, etc.)



EMC + the 6 Pathways to the Cloud



Pacific Crest Securities recently published the results of a survey of chief information officers (CIO) as regards cloud computing. The study found that CIO’s are finding the “path to the cloud” is more complicated than just signing up with Amazon Web Services (AWS) or upgrading shares of EMC to Outperform from Neutral. In this collection, we highlight EMC’s recent advancements, broken down by “pathway”: virtualization and automation, OpenStack, converged systems and services.



Takeaways



That wraps up another week in storage. Here are two takeaways I’d focus on this week: (1) You aren’t giving the market opportunity to the connected devices of the Internet of Things nearly enough “facetime”, (2) there are 6 pathways to the cloud, understand how each plays into your companies’ cloud plans, (3) Kim Dotcom might be a genius, but he sure loves controversy doesn’t he?



Wrap-Up, GE Industrial Internet (2013), with John Furrier, Dave Vellante, and Jeff Kelly

Video Rating: / 5



The post GE Brings Predix Industrial Platform to Microsoft Cloud appeared first on Homeland Security Degrees.

















xDedic Marketplace for hacked servers reappeared on Tor | Homeland Security Degrees

xDedic Marketplace for hacked servers reappeared on Tor | Homeland Security Degrees

https://homelandsecurityedus.wordpress.com/2016/07/14/xdedic-marketplace-for-hacked-servers-reappeared-on-tor/





Following a short disappearance, the xDedic market – the infamous ‘eBay’ of hacked servers, has made a new appearance on the Tor network.



The xDedic market is still offering everyone from entry-level cybercriminals to APT groups fast, cheap and easy access to legitimate organizational servers.



The domain (xdedic[.]biz) went offline following a report from Kaspersky Labs which detailed in its Corporate News section, the scope and method of operations of the illicit marketplace.



Up to 70,000 hacked servers were on offer from the site for as little as $ 6 USD, and with 416 registered sellers in 173 countries, the platform was operating a highly successful glob…

To learn more visit: Security Affairs



The post xDedic Marketplace for hacked servers reappeared on Tor appeared first on Homeland Security Degrees.















Tor and Linux Users Are Extremists? The NSA Thinks So | Homeland Security Degrees

Tor and Linux Users Are Extremists? The NSA Thinks So | Homeland Security Degrees

https://homelandsecurityedus.wordpress.com/2016/07/14/tor-and-linux-users-are-extremists-the-nsa-thinks-so/





The National Security Agency (NSA) has reportedly turned its focus on Tor and Linux users, having recently shown a keen interest in these users’ online activities.



The NSA has gone as far as calling users of products such as The Amnesic Incognito Live System (Tails) and Tor as extremists. Readers of Linux Journal were also designated as extreme. Users of these products, however, maintain that they are used due to the security and anonymity they provide.



The Tor Project revealed that the NSA flags members of the Tor community and their related IP addresses for surveillance. And, documentation leaked in connection with Edward Snowden includes information about XKeyscore, a…

To learn more visit: Security Affairs



Visiting Websites About Privacy Gets You Put in an NSA Database of “Extremists”

Merely expressing an interest in anonymity makes you a target



‘Potential Extremists’: Merely going to Tor’s website will land you on NSA’s red list video here: http://youtu.be/kvjdxtS2BmU



Searching for online articles about privacy is enough to get someone put in an NSA database of “extremists,” according to new revelations published today.



In an article for German news outlet Tagesschau (translation here), Lena Kampf, Jacob Appelbaum and John Goetz reveal how the NSA’s “deep packet inspection” rules, which it uses to determine who to target for deep surveillance, include looking for web users who search for articles about Tor and Tails, an anonymous browser and a privacy-friendly operating system.



Those whose Internet traffic patterns suggest merely an interest in Tor or Tails are immediately put on a list of “extremists,” as is anyone who actually uses the Tor network.



“Tor and Tails have been part of the mainstream discussion of online security, surveillance and privacy for years. It’s nothing short of bizarre to place people under suspicion for searching for these terms,” writes Boing Boing’s Cory Doctorow, adding that the NSA’s goal is, “to split the entire population of the Internet into “people who have the technical know-how to be private” and “people who don’t” and then capture all the communications from the first group.” More Here: http://www.infowars.com/visiting-websites-about-privacy-gets-you-put-in-an-nsa-database-of-extremists/







Video Rating: / 5

The post Tor and Linux Users Are Extremists? The NSA Thinks So appeared first on Homeland Security Degrees.















Hacker Interviews – Chema Alonso | Homeland Security Degrees

Hacker Interviews – Chema Alonso | Homeland Security Degrees

https://homelandsecurityedus.wordpress.com/2016/07/13/hacker-interviews-chema-alonso/





Enjoy the interview with Chema Alonso (@chemaalonso), Chief Digital Officer at Telefonica, who is one of the most talented cyber security experts.



Chema Alonso is currently Chief Digital Officer at Telefonica, he is one of the most talented cyber security experts, a skilled hacker that is considered a star of the IT security industry.



Enjoy the interview.



http://www.homelandsecurityedus.org/wp-content/uploads/2016/07/Chema-Alonso.jpg"; alt="Chema Alonso" srcset=" http://i1.wp.com/securityaffairs.co/wordpress/wp-content/uploads/2016/07/Chema-Alonso.jpg?w=595 595w, http://i1.wp.com/securi…;

To learn more visit: Security Affairs









A lo largo del tiempo recibo muchas peticiones de consejo sobre cómo aprender hacking o seguridad informática. Ya escribí en el pasado sobre esto, pero como sigo recibiendo muchas peticiones, os dejo un vídeo con algunas ideas y con enlaces a recursos:



Consejos:

http://www.elladodelmal.com/2013/08/como-ser-hacker-o-como-aprender-hacking.html

http://www.elladodelmal.com/2014/09/unos-consejos-para-ti-que-vas-la.html

http://www.elladodelmal.com/2015/02/consejos-malignos-para-la-etapa.html



Blogs:

http://www.elladodelmal.com

http://www.seguridadapple.com

http://blog.elevenpaths.com

http://www.securitybydefault.com

http://blog.segu-info.com.ar

http://hackplayers.com

http://flu-project.com



Libros

– Pentesting con FOCA

http://0xword.com/es/libros/59-pentesting-con-foca.html

– Hacking con Buscadores

http://0xword.com/es/libros/20-libro-hacking-buscadores-google-bing-sodan-robtex.html

– Hacking Web: SQL Injection

http://0xword.com/es/libros/25-libro-hacking-aplicaciones-web-sql-injection.html

– Ataques en redes de datos IPv4&IPv6

http://0xword.com/es/libros/26-libro-ataques-redes-datos-ipv4-ipv6.html

– Libros para aprender

http://www.elladodelmal.com/2015/01/0xword-abre-para-las-compras-de-ultima.html



Cursos:

– The Security Sentinel

http://thesecuritysentinel.es/

http://www.thesecuritysentinel.es/1/curso_de_hacking_etico_676481.html

Video Rating: / 5



The post Hacker Interviews – Chema Alonso appeared first on Homeland Security Degrees.















Nymaim Ransomware-Downloader Spikes Big | Homeland Security Degrees

Nymaim Ransomware-Downloader Spikes Big | Homeland Security Degreeshttps://homelandsecurityedus.wordpress.com/2016/07/13/nymaim-ransomware-downloader-spikes-big/ Nymaim Ransomware-Downloader Spikes Big Over the course of 2016 the ESET research team has seen the number of Nymaim malware-related infections spike by 63% compared to the first half of 2015. By the end of June 2016 ESET researchers had seen more detections than all of 2015. So far Nymaim has resulted in more than 2.8 million infections according to ESET. Those infections are mostly in Poland (54% of all Nymaim detections this year) Germany (16%) and in the US (12%). But Nymaim has now made its way to South America with attacks targeting finan To learn more visit: The post Nymaim Ransomware-Downloader Spikes Big appeared first on Homeland Security Degrees. Nymaim Ransomware-Downloader Spikes Big

Homeland Security Secretary Says It’s Important to Stand With Police After Dallas Shooting | Homeland Security Degrees

Homeland Security Secretary Says It’s Important to Stand With Police After Dallas Shooting | Homeland Security Degrees

https://homelandsecurityedus.wordpress.com/2016/07/12/homeland-security-secretary-says-its-important-to-stand-with-police-after-dallas-shooting/





In the wake of the sniper shooting in Dallas that killed five law enforcement officers and injured seven others, Homeland Security Secretary Jeh Johnson said it’s important to stand with police officers. “At a time like this it’s important to stand ……

To learn more visit: homeland security – BingNews



The post Homeland Security Secretary Says It’s Important to Stand With Police After Dallas Shooting appeared first on Homeland Security Degrees.















ANALYSIS: FAMS Must Promote from Within and Build Culture of Professionalism | Homeland Security Degrees

ANALYSIS: FAMS Must Promote from Within and Build Culture of Professionalism | Homeland Security Degrees

https://homelandsecurityedus.wordpress.com/2016/07/12/analysis-fams-must-promote-from-within-and-build-culture-of-professionalism/









Federal Air Marshal……

To learn more visit: Homeland Security Today



Inspirational video that inspires a co-workers and business people to unite and work towards a common goal.

Video Rating: / 5



The post ANALYSIS: FAMS Must Promote from Within and Build Culture of Professionalism appeared first on Homeland Security Degrees.















The hidden link between the Angler EK drop and the Lurk gang | Homeland Security Degrees

The hidden link between the Angler EK drop and the Lurk gang | Homeland Security Degrees

https://homelandsecurityedus.wordpress.com/2016/07/11/the-hidden-link-between-the-angler-ek-drop-and-the-lurk-gang/





Experts from Talos team have found a link between the drop in the Angler Kit usage and the crackdown against the Lurk gang.



Security experts believe to have found a link between the drop in the Angler Kit usage and the crackdown against the Lurk gang.



Law enforcement arrested suspects in June, authorities accused them of stealing around $ 45 million USD from Russian financial institutions by using the Lurk banking trojan.



According to the Cisco Talos researchers, after the arrests of the individuals behind the Lurk banking trojan it has been observed a rapid disappearance of the Angler EK in the wild.



Recently malware researchers observed a spike in the mali…

To learn more visit: Security Affairs



The post The hidden link between the Angler EK drop and the Lurk gang appeared first on Homeland Security Degrees.















The U.S wants more chunks of Indian defence market | Homeland Security Degrees

The U.S wants more chunks of Indian defence market | Homeland Security Degrees

https://homelandsecurityedus.wordpress.com/2016/07/11/the-u-s-wants-more-chunks-of-indian-defence-market/





The Indian market for advanced weapon systems has been for years one with a very big potential for the Israeli defence industries. …

To learn more visit: iHLS Israel Homeland Security









WASHINGTON (Army News Service) — By understanding “Go” — a board game said to have been invented in China around 3,000 years ago — the United States can better craft its national security strategy with China and avoid war, said William “Trey” Braun.



Braun, a retired Army colonel and research professor at the U.S. Army War College’s Strategic Institute, led a discussion on U.S.-China strategy at the National Press Club here, May 24.



With him were some of the 10 U.S. and international students from the USAWC, who participated in a nine-month study of that strategy. Braun was project lead, with support from fellow USAWC research professor David Lai.



THE GRAY ZONE



Before understanding Go, however, one needs to understand the tense relationship China and the U.S. have, Braun said, describing it as “the gray zone.”



Basically, both countries are operating in the gray zone, where neither war nor peace is present. And, “the U.S. is not doing well in that competitive space,” he said.



When Beijing hosted the summer Olympics, that marked China’s emergence into a stage of power transition marked by growing assertiveness, he said. It was at that time that China — a rapidly rising military and economic power — began to flex its muscles in the region. At the same time, the U.S. went into the so-called “Great Recession” and was focused in Southwest Asia.



By flexing its muscle, Braun said he meant China occupying reefs in the South China Sea inside an arc of territory they felt was taken from them after World War II. China also began challenging air and nautical passage of other countries with its own air and naval fleet, sometimes using its fishing vessels as proxies.



Braun said his group’s study predicted that future aggressive acts could result in a miscalculation that triggers war. In fact, he noted, 16 countries from other parts of the world at one time went through their own gray zones with competitor nations; and, of those 16, 12 resulted in miscalculations leading to war.



The goal of the study, he said, was to find a way for the U.S. and its partner nations in that area to navigate smoothly through the gray zone competition, so China’s rise to eventual U.S. equality of power in the region will transition peacefully. Both countries, he noted, share this desire to resolve differences without using force.



MORE THAN A GAME



Go is much more than a game, Braun said. It’s the prism through which China views the world and the way it thinks and operates. And, if America wants to be successful in the gray zone, it needs to first understand how their game is played.



Braun compared and contrasted Go to the Western game of chess.



In Go, a two-player game, the object is to surround and seize an opponent’s terrain. Players use white or black stones as game pieces. The idea is to outmaneuver the other player’s arrangement of stones on the board, which is about the size of a chess board but with many more positions that can be played.



While the game of Go produces a winner just as in chess, he explained, the difference is that in Go, the “loser” who played well may have lost overall, but won in various sections of the board and can walk away from the game knowing not all was lost.



This analogy speaks to a range of gray zone competitive interests China and the U.S. have in other parts of the world, in military aspects, cyber, space, policy and economic, he said. There doesn’t need to be a clear winner across the board.



He then offered another analogy.



The aim of Go is to win without fighting and an apparent attack doesn’t need to occur right away. It more or less unfolds, he said. In chess, the aim is to right away attack, remove opposing pieces and checkmate the other’s king, Braun said.



The chess analogy for the U.S. is that when “its interests are threatened” it has a tendency “to break glass, bring out the military and then go back to peace,” he said. That’s now how the Chinese operate. Their strategy unfolds over time, not in an abrupt manner.



GO-LIKE STRATEGIES OFFERED



The U.S. Army and national strategy policymakers need to understand this Chinese mindset and perspective in order to accommodate China as a co-power in the region, without necessarily compromising partnerships with allies in the region, Braun said.



There are low-cost approaches to accomplishing this, he said.



To sum them up, Braun said, most involve sharing the cost and burden of a regional defense and letting other countries lead when it comes to military training and preparedness. Right now, the countries in that area look to the U.S. to lead and to provide advanced military technology. “We’re not allowing our partners to grow.”



Editor’s note: to sign up for ARNEWS email subscription, visit: https://public.govdelivery.com/accounts/USDODARNEWS/subscriber/new



Video Description Credit: David Vergun



Video Credit: Russian Military



Video Thumbnail Credit: 中华人民共和国国防部网(www.mod.gov.cn)Modified by ArmedForcesUpdate

Video Rating: / 5



The post The U.S wants more chunks of Indian defence market appeared first on Homeland Security Degrees.