Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

… more suitable for my needs, but I’m not sure about it. So, lots of options,...

Have a look at Zafesoft, as well as ArtistScope. Let me know if these fall short of what you are looking for.

View Article


Image may be NSFW.
Clik here to view.

REVIEW: “Steve Jobs”, Walter Isaacson

BKSTVJBS.RVW 20111224 “Steve Jobs”, Walter Isaacson, 2011, 978-1-4104-4522-3 %A   Walter Isaacson pat.zindulka@aspeninstitute.org %C   27500 Drake Road, Farmington Hills, MI   48331-3535 %D   2011 %G...

View Article


Image may be NSFW.
Clik here to view.

Microsoft Active Protections Program and Battling Botnets – TwC Interactive...

Continuing the Interactive Timeline series outlining some of the seminal events that have occurred over the last ten years, this post looks at more of the key events that shaped Microsoft’s Security...

View Article

Image may be NSFW.
Clik here to view.

Computational Machinations, Mictyris Guinotae

  News, of Nippon based computer science boffins (specifically Yukio-Pegio Gunji, Yuta Nishiyama and Andrew Adamatzky)  whom, have reportedly modeled a computational ball-gate device after one of the...

View Article

Image may be NSFW.
Clik here to view.

Information Security Experts, Fake

  Another superb information security short motion picture from Javvad Malik's accomplice, the inimitable CynicGirl. ⌱  

View Article


Image may be NSFW.
Clik here to view.

InfoSec Daily Podcast Episode 648

Episode 648 - Overblown, Mini Pwner, 15yo Hacker, Cabin Cr3w, and "Weird" Redir

View Article

Image may be NSFW.
Clik here to view.

Cloud Security Infographic Asks,How Good is Your Cloud Security?

New cloud security infographic asks, How Good is Your Cloud Security? The data comes from the Ponemon Research report on Managing Firewall Risks in the Cloud, which is available at...

View Article

Image may be NSFW.
Clik here to view.

SBN Sponsor Post

See what you missed at RSA Conference 2012 in San Francisco. View keynotes and session presentations.http://bit.ly/H2OSbR

View Article


Image may be NSFW.
Clik here to view.

Oracle’s Q2 CPU Release

Oracle released its latest vulnerability list. What this release highlights is the fact that Oracle should provide work-around instructions rather than dogmatically stick to immediate patching as the...

View Article


Image may be NSFW.
Clik here to view.

Lightweight Portable Security

The Lightweight Portable Security (LPS) distribution has been around for awhile but I thought I’d put out a quick post for those that might not be familiar with it. The DoD created this Linux distro...

View Article

Image may be NSFW.
Clik here to view.

The Defensible Enterprise

Visible Risk: The Defensible Enterprise. The lead-in to a multipart series outlining Enterprise Visibility, Perspective and creating a defensible enterprise that lends itself towards incident detection.

View Article

Image may be NSFW.
Clik here to view.

Yesterdays blog entry was fiction – I hope

For the avoidance of doubt, I have added a footnote to my blog entry on DCMS Broadband strategy yesterday to point out that it was intended as satire. It is not (to the best of my knowledge) based on...

View Article

Image may be NSFW.
Clik here to view.

How to generate virtual traffic jams on Yandex Maps

ThebeginningOnce, I (@_chipik) wasstuck in a traffic jam and that got me thinking about how people choose one orthe other route. Obviously, there are many reasons.But animportant role, no doubt, is...

View Article


Image may be NSFW.
Clik here to view.

ssh-agent: Abusing the trust – Part 1

This post is about ssh-agent. For those who don't know, the following best describes it (from the man page):ssh-agent is a program to hold private keys used for public key authenticationMany...

View Article

Image may be NSFW.
Clik here to view.

ssh-agent: Abusing the trust – Part 1

This post is about ssh-agent. For those who don’t know the following best describes it (from the man page): ssh-agent is a program to hold private keys used for public key authentication Many...

View Article


Image may be NSFW.
Clik here to view.

SBN Sponsor Post

April Webcast: register now for our upcoming webcast, “Large Scale Cloud Forensics” at 2pm EST April 25th.http://bit.ly/xOGmy0

View Article

Image may be NSFW.
Clik here to view.

Hey! +Paul McNamara! Why am I not on your list? (On second thoughts, no; I...

Hey! +Paul McNamara! Why am I not on your list? (On second thoughts, no; I need to get more creative with my Bragging Rights.)

View Article


Image may be NSFW.
Clik here to view.

Security Forum 2012

The Security Forum is the annual IT-Security Conference in Hagenberg that addresses current issues in this domain. Traditionally it takes place over the course of two days in April. On the first day...

View Article

Image may be NSFW.
Clik here to view.

Fraudulent calls target US banks, another look at caller ID spoofing

A recent report has shown a large increase in the number of fraudulent phone calls attempting to voice phish customers of US banks.

View Article

Image may be NSFW.
Clik here to view.

Eugene Kaspersky on the evolution of malware

Co-founder of Kaspersky Lab and a true cybersecurity guru Eugene Kaspersky gives a short talk, expressing his viewpoint on malware evolution: the way malware was, the way it is now and how things might...

View Article
Browsing all 37364 articles
Browse latest View live