Category Archives: Security Training, Awareness and Reports
2011 Cybercrime Survey Report, by PwC
PwC has published new cybercrime survey report. (direct link) “PwC” is the brand under which member firms of PricewaterhouseCoopers International Limited (PwCIL) operate and provide services. Together, these firms form the PwC network. Each firm in the network is a … Continue reading
“Luckycat” threat, analysis by Trend Micro
Trend Micro has published their report on Luckycat APT campaign. Advanced persistent threat (APT) usually refers to a group with both the capability and the intent to persistently and effectively target a specific entity. Advanced – Operators behind the threat … Continue reading
Privacy Maturity Model PMM, by AICPA/CICA
The AICPA/CICA has produced Privacy Maturity Model (PMM). CICA: The Canadian Institute of Chartered Accountants (CICA) represents Canada’s CA profession both nationally and internationally. The CICA is a founding member of the International Federation of Accountants (IFAC) and the Global … Continue reading
Booklet “EU surveillance”
EDR (European Digital Rights) has published an interesting paper called “EU Surveillance“ EDR: European Digital Rights was founded in June 2002. Currently 28 privacy and civil rights organisations have EDRI membership. Members of European Digital Rights have joined forces to … Continue reading
Security Awareness for Teens, by ISECOM
The security and privacy awareness program developed by ISECOM contains 12 lessons teaching material. Lesson 01 – Being a Hacker Lesson 02 – Windows and Linux Lesson 03 – Ports and Protocols Lesson 04 – Services and Connections Lesson 05 … Continue reading
ETSI Security Workshop 2012
Material from ETSI Security Workshops is usefull information for learning and understanding what is happening in the industry. Here are the main links: Permanent link to latest workshop Link to 2012 workshop Presentations of the 2012 workshop
Common Criteria, main links
Wikipedia: Common Criteria is a framework in which computer system users can specify their security functional and assurance requirements, vendors can then implement and/or make claims about the security attributes of their products, and testing laboratories can evaluate the products … Continue reading