Quick Book Review – The Alexandria Project, by Andrew Updegrove
THANK YOU FOR YOUR CONTRIBUTION TO THE ALEXANDRIA PROJECT In a slight departure from my usual reading material of John le Carré and non-fiction technical tomes, I recently read The Alexandria Project...
View Articlersyslog templates & json
I today added a simpler method to specify JSON inside rsyslog templates. The new method simplifies specifying JSON-encoded fields. It still looks a bit ugly, but if you look closely enough, you'll...
View ArticleNot All Web Vulnerabilities Are What They Appear to Be
When performing web security assessments, it’s easy for us to feel confident in what we see. Take Cross-Site Scripting (XSS) for instance. Your scanner finds this web vulnerability. You validate that...
View ArticleUpdate: Rogue Microsoft employee gets a metaphorical chair thrown at him by...
Update: Rogue Microsoft employee gets a metaphorical chair thrown at him by Microsoft's PR people. #ITBW $MSFT...
View ArticleDHS: Chinese Nationals Charged With Software Piracy And Exporting Technology...
More than $100 million in lost revenue to American companies
View ArticleAWS Marketplace Launches; Alert Logic Among First Security Tools Available
The much-anticipated Marketplace for Amazon Web Services (AWS) officially launched today. The marketplace has the potential to transform the way apps and services for the Amazon Cloud infrastructure...
View Article2012 Faces of Fraud Survey: More Consumer Engagement Needed For Trust In...
While bank customers are not the root cause of fraud, they are actually one of the top sources for fraud detection, Authentify survey reveals
View ArticleLeaseWeb And StopBadware Unite To Combat Cybercrime
The relationship with StopBadware is the latest step in LeaseWeb’s Community Outreach Project
View ArticlePhony LinkedIn reminders help users connect with malware
Phony LinkedIn invitations are not a new phenomenon. What tends to change is the underlying delivery method used for the malware distribution – In this case compromised websites that unknowingly host...
View ArticleThe Great Hypothesis
Here I sit at the kitchen table at 5:30 in the morning, coffee in hand, writing the first sentence of a blog post I’ve known about for weeks. Yet, I have nothing planned – nothing prepared – so I, in...
View ArticleInvestigating Indicators of Compromise In Your Environment With Latest...
Recently, Mandiant® released a new version of Redline™. If you are not familiar with Redline, it is a great tool for investigating a specific Windows host in depth. We will have a more thorough look...
View ArticleDéfaut Infosec de la Journée: The Sorry Tale of NoSQL
Yes, Bunky, database security is still in it's infancy, case in point - those wonderful bits of NoSQL... "...So, yes, the NoSQL world has gone mad, and that's because the big data show is being run...
View ArticleDroppers from Around the World: Brazil
Our next foray into malware droppers takes us to Brazil. The most common malware dropper there is explorer.exe (aggregating all versions). As we noted in earlier posts in this series, when you see...
View ArticleWhy banking isn’t just about banking anymore
By Toby Weir-Jones, Vice President of Product Development, Managed Security Solutions Group, BT Global Services Not too long ago, banking was something abstract that Other People Did. We all needed a...
View ArticleApplication Control: Changing The Security Paradigm
Slowly but surely, Application Control is changing the way most people think about traditional security policies. And in this day and age, it’s becoming a mainstay in a comprehensive security-driven...
View ArticleTwC and NCSA – 10 Years of Online Safety & Security
Posted by: Jacqueline Beauchere, Director, Trustworthy Computing Communications For more than a decade, we at Microsoft have been protecting consumers from online safety and security risks not only...
View ArticleSOURCE Conference 2012 this week in Boston!
SOURCE conference 2012 is happening on Boston right now! The keynote for this year’s conference came from Josh Corman and Jericho. Among other talks, the first day also featured Veracode’s Shyama Rose...
View ArticleOpen Source Licensing – Demystified?
Open Source Licensing – Demystified? By: Steve McMaster I’m not sure how many of your listen to our podcast, but in Episode 023, we talked a little about open source licensing. Ian had gone on a...
View ArticleNCP News: Android client and Windows 8 compatability now available
Lots of news from NCP engineering, as we gear up for Interop 2012. Today, NCP announced the preview release of the first third-party IPsec VPN client available for Android 4.0. Now available for free...
View Article