SKYPE: (S)ecurely (K)eep (Y)our (P)ersonal (E)-communications
SKYPE: Securely Keep Your Personal E-communications From time to time people get new computer equipment and need to (re-)install all their favorite programs. Often a painful and time-consuming job, but...
View ArticleSuper Tuesday malware attack targets US voters
If you're following the US elections, don't be duped into infecting your computer.
View ArticleUpdated: Serious security hole in iOS 5.1? Perhaps not..
Is iOS 5.1 allowing people to access your iPhone or iPad without a pass code? Perhaps not, but we were duped!
View ArticleThe Basics: Public Key Crypto … Diffie-Hellman Style
I’ve always been a big fan of understanding the basics of infosec to help your career in the long run. Fitting that this past weekend I came across a great little 5 minute video explaining how public...
View ArticleHow To Get An Invite To Next Years Security Bloggers Meet-up
As I wrote about earlier this years RSA Security Bloggers Meet-up was the best one yet! We had over 170 people, mentalists/magicians, photo booths, great food, top shelf liquor and most of all the...
View ArticleTop 3-5 Things to Remove from PCI DSS
Chip, by Declan Jewell PCI DSS 2.0 has been out for over a year now, and the feedback period is almost closed (ends April 15). If you have not submitted feedback yet, do so! But here’s an interesting...
View ArticleSecOps – A step closer to bridging the Security Operations and IT Operations...
Today's post is a guest-blog by Scott Edwards, from the HP BSM (Business Service Management) group - oddly enough not a 'security' function - but as I promised in a previous post to provide more...
View ArticleSecurity isn’t the only thing tricky to quantify
At the RSA Conference last week, I had an interesting discussion about quantifying security. I was eating the food and drinking the beer that some vendor had cheerfully provided when I got into a...
View ArticleCollusion: Web Tracking, Visualized
Want to discover the tangled web of cookie tracking, on your own device? Examine the well-crafted and succinctly engineered Mozilla Foundation Firefox add-on monikered Collusion. Atul Varma’s...
View ArticleComputer Security Trends and Threats in the Federal Sector – Future of Security
By now we are well aware that advanced persistent threats (APTs) and other cyber attacks can and will wreak havoc -- and IT security professionals are justifiably concerned. A recent ESG research...
View ArticleThe Importance of Being Earnest – About the Application Layer
As a long time security professional and Veracoder heading Product Marketing, Sam King has seen investments in security go up exponentially over the years. Even with all that additional investment,...
View ArticleIt’s Impossible to Secure Everything, So Focus on Your Adversaries
Vulnerability protection is reaching infinity, so why not focus on something that's probably far less, your adversaries.
View ArticleNitrozac and Snaggy: Bachelor iPad
via the comic genius of Nitrozac and Snaggy at The Joy of Tech™
View ArticleChrome falls in first five minutes at Pwn2Own vulnerability contest
Chrome's boastful track record of fending off vulnerabilities in bug-hunting contests seems to have come to an end.
View ArticleNet accesses …
So, I’m always excited about CanSecWest, and I was yesterday, as I got ready. I went to do a last minute download of email. (Yes, the conference provides wireless, and it usually works, after a few...
View ArticleBanking on Badb in the Underweb
Underground Web sites can be a useful barometer for the daily volume of criminal trade in goods like stolen credit card numbers and hijacked PayPal or eBay accounts. And if the current low prices at...
View ArticleFBI arrests 6 — Anonymous Sold Out by One of Its Own
A member of the infamous Anonymous-LulzSec hacker groups, Hector Monsegur, known as Sabu, appears to be the primary snitch in the arrest of five other members of LulzSec announced by the FBI this week.
View ArticleCloud storage data risks and encryption
Are you encrypting the data you keep in the cloud? Or are you trusting the cloud storage providers to do a decent job at security?
View ArticleThere Is No Camera Lock Screen Bypass in iOS 5.1
There have been reports (and here) of iOS 5.1 containing a camera bypass tied to the new camera shortcut on the lock screen. The people who have reported this are sadly confused about the security...
View Article