They Just Keep Trying, and Succeeding
News, via ZDNet's ZeroDay blogger Emil Protalinski , reporting the latest Apple Inc. (NasdaqGS: AAPL) Mac OS X security flaw, this time, a trojan exploit of a different color, requiring absolutely...
View ArticleNew Mac Trojan: Sabpab
A new Trojan known as “Sabpab” could hurt Mac users who run Java and Microsoft Word. Security researchers are warning users to make sure their computers have the latest software updates from both...
View ArticleBonkersWorld: The Solution to Oversleeping
via the comic genius of Manu Cornet at BonkersWorld ℀
View ArticleInfoSec Daily Podcast Episode 646
Episode 646 - Great Failwall of China, More Mac Malware, Microsoft iPhone, Boeing Android, Farmer's Market, and LulzKnights
View ArticleWatching the Watchers: Clouds Rolling In
As much as we love to be the masters of the obvious, we don’t really need to discuss the movement to cloud computing. It’s happening. It’s disruptive. Blah blah blah. Finding someone to dispute any of...
View ArticleFLAMING RETORT: All this new Mac malware – whose fault is it?
Flaming Retort is back, this time trying to Coole and Explayne the flames we've had from some Mac users in the past few days. In a back-to-front way of making Mac fans feel better, I'll start by making...
View ArticleSBN Sponsor Post
Submit a session proposal to present at RSA Conference Europe 2012 – Call for Speakers opens April 10th.http://bit.ly/fcI5QA
View ArticleUnderstanding and Selecting DSP: Use Cases
Database Security Platforms are incredibly versatile – offering benefits for security, compliance, and even operations. The following are some classic use cases and ways we often see them used:...
View ArticleInformation Security Policies Made Easy Version 12
Full disclosure: While I am on the Expert Panel for Information Shield, Inc., publishers of this book, I receive no remuneration other than a review copy, nor do I have any editorial input in the...
View ArticleThe Value of "Security Conferences"
Something to think about ... had an interesting topic come up at the OWASP AppSec APAC here in Sydney this last week about the value of security conferences. Now, I enjoy the talks, the comradery, and...
View ArticlePhishing Using HTML and Intranet Security Settings
Phishers always try to find new ways to bypass security features and trick ‘educated’ users. Over the years we have seen simplistic phishing attempts where the required information had to be typed into...
View ArticleHere comes the “Zahlungspflichtig bestellen” button
Germany leads EU in unpronounceable consumer protection Germany has become the first country to enact a new EU law to protect online consumers against new types of fraud. One visible change will be a...
View ArticleCeCOS VI: because malware is not the only threat…
…in fact, a survey commissioned by ESET some years ago found that in the sample population, Mac users accounted for more of the money lost to phishing and similar scams than PC users. That sample...
View ArticleCounter eCrime Operations Summit
[News of an excellent cybercrime conference taking place in a few days time in Prague] ‘Containing the Global Cybercrime Threat’ is the focus of the Counter eCrime Operations Summit (CeCOS VI) in...
View ArticleBlurring the lines: complexity, the logical network and the elastic perimeter
By Toby Weir-Jones, Vice President of Product Development, Managed Security Solutions Group, BT Global Services The type of network you can put together today — using simple tools and little real...
View Article“Gerolamo Pizzeria” Spam Invades Inboxes
Researchers in the AV Labs received a spam that is unlike the usual batch of Viagra spam and Rolex spam that we would normally see in our inboxes: pizza spam. And the spammers behind it are back to...
View ArticleCeCOS cybercrime summit (and CARO/AMTSO workshops)
[No testing-related content to CeCOS VI that I'm aware of, but as I know that phishing and cybercrime are of importance to many of the researchers associated with AMTSO in some way, I'm happy to use...
View ArticleEmsisoft Warns Of A New Windows Servers Threat: Poor Password Policies Open...
A hacker group is currently attacking Windows Servers running publicly accessible Remote Desktop and Terminal Services
View ArticleiPad Mini: Low-price 7-in rumors, release date 'soon'. In IT Blogwatch,...
iPad Mini: Low-price 7-in rumors, release date 'soon'. In IT Blogwatch, bloggers squint at the scuttlebutt. #ITBW by +Richi Jennings for +Computerworld $AAPL http://goo.gl/news/K2dT
View ArticleIs EURIM about to become the Digital Single Market champion?
The draft Data Protection Regulation contains "necessary ambiguities" in order to achieve agreement on "harmonisation". Those ambiguities create yet more legal and regulatory uncertainty confusion of...
View Article