Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Alleged TeaMp0isoN teen hackers charged with jamming anti-terrorist hotline

Two teenagers have been arrested following a series of prank calls and DoS (denial-of-service) attacks launched against the Anti-Terrorist Hotline.

View Article


Image may be NSFW.
Clik here to view.

Stratum is hiring!

We are hiring experienced security consultants. Full details here: http://www.stratumsecurity.com/careers Perks include: pick your own laptop, utilization bonuses, business development commissions,...

View Article


Image may be NSFW.
Clik here to view.

Counter eCrime Operations Summit next week

[I've blogged on this elsewhere, but I'm pretty sure that this will be of interest to some of the readers of this blog, so here are the details as supplied by the Anti-Phishing Working Group.]...

View Article

Image may be NSFW.
Clik here to view.

SBN Sponsor Post

See what you missed at RSA Conference 2012 in San Francisco. View keynotes and session presentations.http://bit.ly/H2OSbR

View Article

Image may be NSFW.
Clik here to view.

Learning to cook – Bake a Trusted Cloud Part 2

Proving that physical and virtual infrastructure of the cloud can be trusted can be prohibitively difficult, especially when it comes to cloud services from external service providers. Verifying secure...

View Article


Image may be NSFW.
Clik here to view.

UK Prof Creates Crab Computing with Kobe Boffins. British scientists, in...

UK Prof Creates Crab Computing with Kobe Boffins. British scientists, in collaboration with Japanese researchers, have 'invented' binary logic based on crustaceans. Specifically, the swarming behaviour...

View Article

Image may be NSFW.
Clik here to view.

Through the looking glass…. 2012-04-17 07:24:00

Quote of the week (well, actually from last week): from Mary Ann Davidson on the Oracle blog: "an unfortunate concomitant of Doing Something is that often the cure is worse than the ailment." Deep,...

View Article

Image may be NSFW.
Clik here to view.

The Dissolving Network Perimeter – And What You Can Do About It!

Guest post by Matthew Pascucci, Information Security Writer and Practitioner. This should come as no surprise, but the network perimeter is disappearing – or at least it’s getting very blurry. If this...

View Article


Image may be NSFW.
Clik here to view.

Spectorsoft Webinar on Compliance and UAM

I am appearing on a webinar tomorrow with my friends at Spectorsoft. The webinar is free and one attendee will win an iPad3. The details are below: Date: April 18, 2012 | Time: 2:00 PM EST Attend and...

View Article


Image may be NSFW.
Clik here to view.

What is 45 Seconds Worth?

One of the hardest cases to make for any CTO or CIO is that reducing helpdesk calls or saving users 45 seconds per login is a true cost save. Typically referred to as “soft savings” they are considered...

View Article

Image may be NSFW.
Clik here to view.

DLP is Essential; the Issue is “How”

Before we begin, I recommended reading Getting Ready For Data Loss Prevention (DLP). Go ahead, I’ll wait for you… Back? OK, now let’s talk what comes after; the “How” to implement DLP part. As a next...

View Article

Image may be NSFW.
Clik here to view.

Mac security commentary

Two articles low on geek content, but better than half-decent media commentary: Five OS X security threats that fizzled: Chris Foresman for Ars Technica Latest Mac Malware Attack Is a Wake-Up Call for...

View Article

Image may be NSFW.
Clik here to view.

Big Data vs Social Engineering

Some of the discussions we are having over here are brain-wrinklers! I was speaking with some colleagues yesterday about the security implications of big data. Typically I would group them into two...

View Article


Image may be NSFW.
Clik here to view.

Effective Application Security Testing: The Evil Streak

We've made it to the last part of my four part series on what makes a great security tester or hacker. Even though this fourth piece is what I consider to be the most important and exciting quality of...

View Article

Image may be NSFW.
Clik here to view.

Nanny Cam

Back in 2009 I wrote a blog post about locking doors. I proposed that there are some people who think it is an indictment on the door locker to lock doors. Some people are proud that they live in a...

View Article


Image may be NSFW.
Clik here to view.

Verizon’s latest breach delivery

I was catching up on my backlog of podcasts last week, and listened to Episode 271 of the Network Security Podcast (part of my balanced diet of security fiber). If you're not familiar with this...

View Article

Image may be NSFW.
Clik here to view.

Nessus Perimeter Service with New Tenable PCI Scanning Service Available

Tenable is pleased to announce availability of the Nessus Perimeter Service including the Tenable PCI Scanning Service. Customers can scan an unlimited number of Internet-facing IP addresses, as often...

View Article


Image may be NSFW.
Clik here to view.

SecurityCenter 4.4 Released

SecurityCenter 4.4 Expands USM Capabilities SecurityCenter version 4.4 is available today from Tenable Network Security. Customers can download the updated release from the Tenable Support Portal. You...

View Article

Image may be NSFW.
Clik here to view.

It Only Took Five Years…

News, via the inimitable security researchers at ZDNet's ZeroDay blog (in this case, Emil Protalinski), detailing the fiver-year old flaw in SAMBA, the open source windows file server, available in...

View Article

Image may be NSFW.
Clik here to view.

Leveraging the Application Compatibility Cache in Forensic Investigations

Today, we’re launching a new freeware tool, Shim Cache Parser™, which we developed in the course of our incident response investigations.   During keyword searches of compromised systems, we discovered...

View Article
Browsing all 37364 articles
Browse latest View live


Latest Images