Alleged TeaMp0isoN teen hackers charged with jamming anti-terrorist hotline
Two teenagers have been arrested following a series of prank calls and DoS (denial-of-service) attacks launched against the Anti-Terrorist Hotline.
View ArticleStratum is hiring!
We are hiring experienced security consultants. Full details here: http://www.stratumsecurity.com/careers Perks include: pick your own laptop, utilization bonuses, business development commissions,...
View ArticleCounter eCrime Operations Summit next week
[I've blogged on this elsewhere, but I'm pretty sure that this will be of interest to some of the readers of this blog, so here are the details as supplied by the Anti-Phishing Working Group.]...
View ArticleSBN Sponsor Post
See what you missed at RSA Conference 2012 in San Francisco. View keynotes and session presentations.http://bit.ly/H2OSbR
View ArticleLearning to cook – Bake a Trusted Cloud Part 2
Proving that physical and virtual infrastructure of the cloud can be trusted can be prohibitively difficult, especially when it comes to cloud services from external service providers. Verifying secure...
View ArticleUK Prof Creates Crab Computing with Kobe Boffins. British scientists, in...
UK Prof Creates Crab Computing with Kobe Boffins. British scientists, in collaboration with Japanese researchers, have 'invented' binary logic based on crustaceans. Specifically, the swarming behaviour...
View ArticleThrough the looking glass…. 2012-04-17 07:24:00
Quote of the week (well, actually from last week): from Mary Ann Davidson on the Oracle blog: "an unfortunate concomitant of Doing Something is that often the cure is worse than the ailment." Deep,...
View ArticleThe Dissolving Network Perimeter – And What You Can Do About It!
Guest post by Matthew Pascucci, Information Security Writer and Practitioner. This should come as no surprise, but the network perimeter is disappearing – or at least it’s getting very blurry. If this...
View ArticleSpectorsoft Webinar on Compliance and UAM
I am appearing on a webinar tomorrow with my friends at Spectorsoft. The webinar is free and one attendee will win an iPad3. The details are below: Date: April 18, 2012 | Time: 2:00 PM EST Attend and...
View ArticleWhat is 45 Seconds Worth?
One of the hardest cases to make for any CTO or CIO is that reducing helpdesk calls or saving users 45 seconds per login is a true cost save. Typically referred to as “soft savings” they are considered...
View ArticleDLP is Essential; the Issue is “How”
Before we begin, I recommended reading Getting Ready For Data Loss Prevention (DLP). Go ahead, I’ll wait for you… Back? OK, now let’s talk what comes after; the “How” to implement DLP part. As a next...
View ArticleMac security commentary
Two articles low on geek content, but better than half-decent media commentary: Five OS X security threats that fizzled: Chris Foresman for Ars Technica Latest Mac Malware Attack Is a Wake-Up Call for...
View ArticleBig Data vs Social Engineering
Some of the discussions we are having over here are brain-wrinklers! I was speaking with some colleagues yesterday about the security implications of big data. Typically I would group them into two...
View ArticleEffective Application Security Testing: The Evil Streak
We've made it to the last part of my four part series on what makes a great security tester or hacker. Even though this fourth piece is what I consider to be the most important and exciting quality of...
View ArticleNanny Cam
Back in 2009 I wrote a blog post about locking doors. I proposed that there are some people who think it is an indictment on the door locker to lock doors. Some people are proud that they live in a...
View ArticleVerizon’s latest breach delivery
I was catching up on my backlog of podcasts last week, and listened to Episode 271 of the Network Security Podcast (part of my balanced diet of security fiber). If you're not familiar with this...
View ArticleNessus Perimeter Service with New Tenable PCI Scanning Service Available
Tenable is pleased to announce availability of the Nessus Perimeter Service including the Tenable PCI Scanning Service. Customers can scan an unlimited number of Internet-facing IP addresses, as often...
View ArticleSecurityCenter 4.4 Released
SecurityCenter 4.4 Expands USM Capabilities SecurityCenter version 4.4 is available today from Tenable Network Security. Customers can download the updated release from the Tenable Support Portal. You...
View ArticleIt Only Took Five Years…
News, via the inimitable security researchers at ZDNet's ZeroDay blog (in this case, Emil Protalinski), detailing the fiver-year old flaw in SAMBA, the open source windows file server, available in...
View ArticleLeveraging the Application Compatibility Cache in Forensic Investigations
Today, we’re launching a new freeware tool, Shim Cache Parser™, which we developed in the course of our incident response investigations. During keyword searches of compromised systems, we discovered...
View Article