I have used the below flashcards while preparing for the CISSP exam during fall 2018. Most of them are still relevant for the 2019 exam.
Simon Cocking is Senior Editor at Irish Tech News and freelances for Sunday Business Post, Irish Times, The Southern Star, Dublin Globe and other publications. He has been based in Ireland for over 20 years. https://irishtechnews.ie/ Available on 9 platforms Click on Listen on Your Favourite Platform
E-mail log-in information of employees in several government agencies and educational institutions, as well as details of over 19,000 compromised payment cards from banks here, has been put up for sale online by hackers.
The Norwegian company said it did not yet know the “full extent of the situation”, but said that the IT systems for most of its activities had been affected and that it had shut several metal extrusion plants, which manufacture components to be used in cars, planes and in the construction industry.
Celeste Fralick, Chief Data Scientist, McAfee, LLC Steve Grobman, Senior Vice President and Chief Technology Officer, McAfee, LLC Fire. In the wild, it’s a force for destruction. Controlled, it powers civilization’s forward evolution. But containing phenomena—natural or manmade—is a devilish challenge. Innovations that strengthen our defenses can also fuel targeted attacks, so the weaponization of AI to amplify the impact
The federal-state legislation body called “Bundesrat” voted for the new measure yesterday, and in the following week, the German federal parliament will review the draft law and decide on whether to pass it or not.
White hat hackers have flooded VKontakte (VK) with spam on Valentine’s Day as part of a revenge prank against the Russian social network after the company failed to both fixes and financially reward a security researcher for a vulnerability he reported to the site a year before.At the heart of the spam campaign was a worm created by Baghosi, a
Voyager Labs is a developer of proprietary core AI algorithms for human behaviour modelling and analysis.
Creating keys to an encryption system, or, alternately, maintaining the encryption but forcing companies to create tools that allow them to attach a “stalker” to the system to monitor communications invisibly (the UK is proposing this method of surveillance, and the below Lawfare Blog post has more on this), automatically creates an enormous incentive for anyone aware of the existence
Hide and Seek (HNS) is a malicious worm which mainly infects Linux based IoT devices and routers. The malware spreads via bruteforcing SSH/Telnet credentials, as well as some old CVEs. What makes HNS unique is there’s no command and control server; instead, it receives updates using a custom peer-to-peer network created out of infected devices. Botnet Connectivity Each HNS infected