Nessus 5.0.1 Released
Tenable is pleased to announce the release of Nessus 5.0.1! This is a point release (moving from 5.0 to 5.0.1), containing enhancements and minor bug fixes. This release improves the stability on all...
View ArticleSpam Leads to Exploits and Fake AV on Twitter
There’s been a couple of rather nasty spam runs taking place on Twitter over the last few days. Heres an example of a rogue URL being spread at the weekend: Click to Enlarge The link in question –...
View ArticleAre You Ready To Migrate To The Right Video Technology?
For the past 12 years, analog cameras and DVR recorders, also known as Closed Circuit Television Video (CCTV), acted as the backbone of security video, replacing tape based video cassette recorders...
View ArticleDigiCert Inc. Names Nicholas Hales CEO
Founder Ken Bretschneider appointed executive chairman of the board
View ArticleThe value of HTTP 404 Errors
The HTTP protocol has a list of response status codes to help communication between the server and the browser. Everytime a server responds to a browser request, a status code is sent. The most common...
View ArticleMicrosoft Responds to Critics Over Botnet Bruhaha
Microsoft’s most recent anti-botnet campaign — a legal sneak attack against dozens of ZeuS botnets — seems to have ruffled the feathers of many in security community. The chief criticism is that the...
View ArticleSpam Cop: If The Messenger Has The Message Wrong, Shoot Him
So it seems that my post both here and on Network World about my recent experience with Spam Cop has touched some nerves in the anti-spam community. I understand, no one likes to hear that their baby...
View ArticleRecent blogs for Infosecurity Magazine
A rather more general item in these days of high-profile attacks on OS X users: a few suggestions to encourage Mac users to reduce attack surface, in the form of another of my blogs for Infosecurity...
View ArticlePenguin Satellite Surveillance
Scientists are perfecting their ability to survey penguins by using high-resolution satellite imagery. The birds now can only hide by flying (underwater) The satellites are actually providing the first...
View ArticlePain Comes Immediately – Secure Development Takes Time
I recently came upon a blog post by Adrian Lane of Securosis titled ‘Pain comes instantly – fixes come later’, in which he comments on yet another blog post ‘Pain comes instantly’ by Oracle’s CSO,...
View ArticleWeek 15 in Review – 2012
Event Related A cyber weapon – alexmgeorge.wordpress.com At RSA 2012 Dave Aitel made a presentation wherein he defined cyber weapons a bit outside of how people normally think. The tried and true...
View ArticleBSides Austin – Security tools for the cloud, password storage, GoogleTV...
There were lots of fantastic presentations at BSides Austin last week, here are a few of our favorites.
View ArticleTwitter Weekly Updates for 2012-04-16
and this people is why FB is a bad idea http://t.co/gpl40KrM do you trust *all* of your friends not to sign up and share your info ? # Pele starts on twitter with 1 tweet and 8k followers… hope the...
View ArticleHaste makes waste; out-of-process firewall changes cause system outages,...
Enterprises have change management processes for a reason. When you “just get it done” without appropriate approvals, notification and testing, bad things tend to happen. Firewall configuration and/or...
View ArticleCeCOS VI: The Counter eCrime Operations Summit
I’ve had a long if intermittent association with the Anti-Phishing Working Group, going back to the early noughties when I represented the UK’s National Health Service there for a while, and...
View ArticleFive Perish in Farallon Race
Horrible tragedy struck Saturday in the difficult wind and wave ocean conditions near the Farallon Islands, 50 km offshore (further than the English Channel is wide) from San Francisco. Latitude 38...
View ArticleStanding up to Bullying
Posted by: Richard Saunders, Director, Trustworthy Computing The new documentary “Bully” is getting quite a bit of media attention for telling the story of school-yard harassment through the eyes of...
View ArticleD-Link Digital Video Storage
D-Link is expanding its IP based video surveillance offerings. Building on their networking experience, D-Link has been assembling an arsenal of network cameras and storage devices that are well...
View Article