Malware Being Called From Your php.ini File
Is your site infected with malware, and you can’t find it anywhere? It might be a good idea to search outside of your web directory, and look in your main configuration files (specially if you are on a...
View ArticleCommerce Hack
Lots of coverage on the WSJ's reporting of the breach at the Chamber of Commerce. This coincides, ironically, with Rich Mogul's column on data security. He writes: To really succeed with data security,...
View Article“I’m in trouble!” email malware distribution attempt
MX Lab, http://www.mxlab.eu, started to intercept a new trojan distribution campaign by email with the subject “Fwd: I’m in trouble!”. The email is send from various spoofed addresses and has the...
View ArticleGetting Your IAM Program Ready for 2012
It’s that time of year, when everyone does their best Carnac the Magnificent impression and rolls out their prognostications and top 10 lists. Here at Identropy, we’re not so sure about trying to...
View Article予期しないクリスマスプレゼント
いよいよクリスマスです。今年は明日の祝日に続き土日と3連休です。寒いところではホワイトクリスマスになりそうですね。より気持ちが盛り上がるクリスマス。素敵な思い出を作ってください。クリスマスプレゼントはもうお決まりでしょうか?よく考えてしまうのですが、クリスマスプレゼントは一回限りの消耗品であったり、金持ち父さんでいう浪費にあたってしまいます。お金の価値は思い出に出費するものだと思います。そこで、お金...
View ArticleLinkedIn Harvesting for OSINT (esearchy video)
LinkedIn Harvesting for OSINT (esearchy video) belongs to Security Aegis
View ArticleHappy Merry.
It seems to be getting harder to give … greetings at this time of the year. There’s a bit of risk involved. Lots of people think we are exclusive to be simply wishing everyone to enjoy our holiday....
View ArticleYet another cool gadget: crypteks USB
USB stick featuring physical protection and data encryption: crypteks.com.
View ArticleEasy instructions for boycotting GoDaddy over SOPA
SOPA is a horrible internet regulation law pushed by the copyright cartels that will destroy many of the freedoms on the Internet, such as the TOR project that anonymizes network traffic for activists...
View ArticleHulme: Nuclear Regulatory Commission Fails FISMA Audit
Writing at CSO, the inimitable George V. Hulme reports independent auditors have released their screed illustrating the failure of the United States Nuclear Regulatory Commision to achieve...
View ArticleOpen Greyhound letter to Alec Baldwin
Excellent letter from a bus company to an irate actor after he publicly compared security measures on an airline to a "Greyhound bus experience" Dear Mr. Baldwin, as president and CEO of Greyhound, I...
View ArticleSBN Sponsor Post
View the RSA Conference August webcast: There.s an App for That: What the Mobile App Explosion Means for Security.http://bit.ly/pZVz0l
View ArticleUSMC Reserve: Toys for Tots Time Square
USMC Photograph, Caleb Gomez, CPL, USMC Outstanding. A United States Marine from the 6th Communication Battalion, based out of AFRC Floyd Bennett Field, Brooklyn, Nww York, collecting toys for the...
View ArticleVIDEO: How to solve the #dragontattoo #sophospuzzle
By popular request, here is a video explaining how to solve the Dragon Tattoo-themed puzzle we published earlier this week...
View ArticleThe Last Friday Summary of 2011
A couple weeks ago we decided to change up the Friday Summary and update the format to something new and spiffy. That… umm… failed. All the feedback we received asked us to keep it the way it is, so...
View ArticleA Security Analysis of Google Transperancy Report
Google publishes every six months a transparency report on the number of requests it receives and action taken from government agencies and courts around the world to remove content from our services...
View ArticleSOPA bill prompts boycott of supporters In IT Blogwatch , bloggers ponder
SOPA bill prompts boycott of supportersIn IT Blogwatch, bloggers ponder protectionism and DNS Balkanizationhttp://blogs.computerworld.com/19480/sopa_bill_prompts_boycott_of_supporters #itbw SOPA bill...
View Article