In light of the upcoming release of Sony’s Playstation 3 on November 17th, and the imminent shortage that […]
Yahoo! shopping is now easier than ever with the launch of its newly redesigned shopping site. While Google’s […]
Information Security, privacy and ensuring that a company’s confidential data remains top secret and its protection are of pivotal importance in any business. The present day corporation employs multiple layers of security, deploying firewalls, IDS, IPS, HIPS etc. However, we all have chinks in our armor and corporations are no different. Leakages tend to occur at the seams of an organization. These days, we do not hear about cases of a lonely hacker toiling away to gain access to a company’s crown jewels whether it is a coca cola recipie or sensitive code or data, there are much more easier ways to gain access to a company’s data and assets. Read on for a detailed look at the information security hazards often found at a typical office workspace.
When system and network admins talk about plugging all the holes and securing their network of denial -of -service attacks, one of the least talked about but one of the most effective network security technique is sinkholing. So what exactly is this ‘sinkholing’? This article is part 1 of a two series each expanding an implementing a different kind of sinkhole.
A sinkhole is defined as a method in which we redirect specific IP network traffic for different security reasons including analysis, diversion of attacks and detection of anomalous activities. It has long been deployed by Tier-1 ISP’s globally usually to protect their downstream customers. However, for the network administrators, sinkholes are generally deployed to provide valuable intelligence regarding the security threats their networks are facing. Read on below for more information on sinkholes and the two kinds of sinkhole implementation — darknets and honeynets and how you can use them to obtain valuable information regarding threats and misconfigurations in your network.