Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Quick Book Review – The Alexandria Project, by Andrew Updegrove

THANK YOU FOR YOUR CONTRIBUTION TO THE ALEXANDRIA PROJECT In a slight departure from my usual reading material of John le Carré and non-fiction technical tomes, I recently read The Alexandria Project...

View Article


Image may be NSFW.
Clik here to view.

rsyslog templates & json

I today added a simpler method to specify JSON inside rsyslog templates. The new method simplifies specifying JSON-encoded fields. It still looks a bit ugly, but if you look closely enough, you'll...

View Article


Image may be NSFW.
Clik here to view.

Not All Web Vulnerabilities Are What They Appear to Be

When performing web security assessments, it’s easy for us to feel confident in what we see. Take Cross-Site Scripting (XSS) for instance. Your scanner finds this web vulnerability. You validate that...

View Article

Image may be NSFW.
Clik here to view.

Update: Rogue Microsoft employee gets a metaphorical chair thrown at him by...

Update: Rogue Microsoft employee gets a metaphorical chair thrown at him by Microsoft's PR people. #ITBW $MSFT...

View Article

Image may be NSFW.
Clik here to view.

DHS: Chinese Nationals Charged With Software Piracy And Exporting Technology...

More than $100 million in lost revenue to American companies

View Article


Image may be NSFW.
Clik here to view.

AWS Marketplace Launches; Alert Logic Among First Security Tools Available

The much-anticipated Marketplace for Amazon Web Services (AWS) officially launched today. The marketplace has the potential to transform the way apps and services for the Amazon Cloud infrastructure...

View Article

Image may be NSFW.
Clik here to view.

2012 Faces of Fraud Survey: More Consumer Engagement Needed For Trust In...

While bank customers are not the root cause of fraud, they are actually one of the top sources for fraud detection, Authentify survey reveals

View Article

Image may be NSFW.
Clik here to view.

LeaseWeb And StopBadware Unite To Combat Cybercrime

The relationship with StopBadware is the latest step in LeaseWeb’s Community Outreach Project

View Article


Image may be NSFW.
Clik here to view.

Phony LinkedIn reminders help users connect with malware

Phony LinkedIn invitations are not a new phenomenon.  What tends to change is the underlying delivery method used for the malware distribution – In this case compromised websites that unknowingly host...

View Article


Image may be NSFW.
Clik here to view.

The Great Hypothesis

Here I sit at the kitchen table at 5:30 in the morning, coffee in hand, writing the first sentence of a blog post I’ve known about for weeks. Yet, I have nothing planned – nothing prepared – so I, in...

View Article

Image may be NSFW.
Clik here to view.

Investigating Indicators of Compromise In Your Environment With Latest...

Recently, Mandiant® released a new version of Redline™. If you are not familiar with Redline, it is a great tool for investigating a specific Windows host in depth. We will have a more thorough look...

View Article

Image may be NSFW.
Clik here to view.

Défaut Infosec de la Journée: The Sorry Tale of NoSQL

  Yes, Bunky, database security is still in it's infancy, case in point - those wonderful bits of NoSQL... "...So, yes, the NoSQL world has gone mad, and that's because the big data show is being run...

View Article

Image may be NSFW.
Clik here to view.

Droppers from Around the World: Brazil

Our next foray into malware droppers takes us to Brazil.  The most common malware dropper there is explorer.exe (aggregating all versions).  As we noted in earlier posts in this series, when you see...

View Article


Image may be NSFW.
Clik here to view.

Why banking isn’t just about banking anymore

By Toby Weir-Jones, Vice President of Product Development, Managed Security Solutions Group, BT Global Services Not too long ago, banking was something abstract that Other People Did. We all needed a...

View Article

Image may be NSFW.
Clik here to view.

C3PO, Half-Shelled

View Article


Image may be NSFW.
Clik here to view.

Application Control: Changing The Security Paradigm

Slowly but surely, Application Control is changing the way most people think about traditional security policies. And in this day and age, it’s becoming a mainstay in a comprehensive security-driven...

View Article

Image may be NSFW.
Clik here to view.

TwC and NCSA – 10 Years of Online Safety & Security

Posted by: Jacqueline Beauchere, Director, Trustworthy Computing Communications   For more than a decade, we at Microsoft have been protecting consumers from online safety and security risks not only...

View Article


Image may be NSFW.
Clik here to view.

SOURCE Conference 2012 this week in Boston!

SOURCE conference 2012 is happening on Boston right now! The keynote for this year’s conference came from Josh Corman and Jericho. Among other talks, the first day also featured Veracode’s Shyama Rose...

View Article

Image may be NSFW.
Clik here to view.

Open Source Licensing – Demystified?

Open Source Licensing – Demystified? By: Steve McMaster I’m not sure how many of your listen to our podcast, but in Episode 023, we talked a little about open source licensing. Ian had gone on a...

View Article

Image may be NSFW.
Clik here to view.

NCP News: Android client and Windows 8 compatability now available

Lots of news from NCP engineering, as we gear up for Interop 2012. Today,  NCP announced the preview release of the first third-party IPsec VPN client available for Android 4.0.  Now available for free...

View Article
Browsing all 37364 articles
Browse latest View live