Richi's Rant: Web Analytics Illegal after 26 May? Crazy! My opinion on the...
Richi's Rant: Web Analytics Illegal after 26 May? Crazy! My opinion on the new UK cookie law? Crazy. Ludicrous. Pointless.#HPIO UK by +Richi Jennings for...
View ArticleSteer Clear of Steam Cracker
I’m all for a spot of Lovecraftian tentacled horror coming down from the sky and laying waste to all and sundry, but not when that same unfathomable horror is doing the same thing to my PC like in the...
View ArticleMan-in-the-Middle For Hire
By Limor S Kessem, Cybercrime and Online Fraud Communications Specialist, RSA Discussion and buzz about the burgeoning Fraud-as-a-Service (FaaS) trend in the cybercrime economy is as constant and as...
View ArticleCryptography for Mere Mortals #4
An occasional feature, Cryptography for Mere Mortals attempts to provide clear, accessible answers to questions about cryptography for those who are not cryptographers or mathematicians. Q: What do...
View ArticleAcunetix Web Vulnerability Scanner Voted WindowSecurity.com Readers’ Choice...
Acunetix Web Vulnerability Scanner Wins the WindowSecurity.com Readers’ Choice Award for the Fifth Successive Year Leading Windows Security resource site, WindowSecurity.com, has announced that...
View ArticleCES on the Hill: Online Infringement & Privacy and Electronic Data Collection
CES on the Hill comes to the nation's capital this spring, bringing together Members of Congress, their staff and the Washington press to mingle with executives from the CE Industry and get a chance to...
View ArticleIMG0893.zip – Your photo all over Facebook? Naked? Malware campaign spammed out
SophosLabs is intercepting a spammed-out malware campaign, pretending to be an email about a revealing photo posted online of the recipient. The emails, which have a variety of subject lines and...
View ArticleMongoDB, BSON and templates…
After I have improved the template system yesterday, I have begun to think again about the integration of custom templates (actually field lists) with ommongodb (rsyslog's mongodb output plugin). A...
View ArticleFamous Hackers From The Past And Present
Hackers aren’t always evildoers bent on destruction or stealing information. Some of the most famous hackers have indeed ended up behind bars. But many have gone on to become productive citizens —...
View ArticleSC Magazine Innovation Award Finalist – Trustwave SpiderLabs PenTest Manager
PenTest Manager, the cutting edge penetration test management and reporting platform used by Trustwave SpiderLabs, was recently "shortlisted" as a finalist for SC Magazine Europe's Innovation Award....
View ArticleWebsense 2012 Threat Report: How Cybercriminals Are Infecting Networks And...
Eighty-two percent of malicious websites are hosted on compromised hosts, according to report
View ArticleFaronics Announces New Anti-Executable Product
Faronics Anti-Executable 5.0 boosts defense against advanced persistent threats, sophisticated malware and zero-day attacks
View ArticleCertes Networks Releases Virtual Security Appliance
Encryption solution protects network traffic inside IaaS clouds and between customer locations
View ArticleNCP Engineering Debuts Universal VPN Client For Android 4.0
Now available for free download in the Google Play store
View ArticleGrecs’ Weekend Best Bets for 2012-04-20
Well we decided to continue this for another week since a few people said they found it useful. As I’ve previously noted most local meetups seem to be crowded into weekday evenings with almost nothing...
View ArticleSpy Software For Tablets Released
Retina-X Studios unveils PeekTab multiplatform monitoring software for tablets
View ArticleAHIMA National Convention
McCormick Place Lakeside Building Chicago, IL US Speaker: Michelle Knighton(...)
View ArticleRT @puntofisso: What about dystopian stories of the Internet of Things? "The …
RT @puntofisso: What about dystopian stories of the Internet of Things? "The gun that tells you who to shoot". #casaconf #talesofthings
View ArticleRFC5424 or cee-enhanced syslog?
I recently got a question if it would be better to implement RFC5424 or cee-enhanced syslog in a new project. This sounds like a though question, but looking at the details helps to ease it a bit....
View Article10 Things To Consider Before Purchasing Cyber Insurance
ID Experts has created a free checklist to help guide companies
View Article