Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Guide to HTML5 Web Security

Further to my previous notes about HTML 5 security, a superb reference document was published earlier this month. Michael Schmidt (Compass Security) wrote his master's thesis about HTML5 security in...

View Article


Image may be NSFW.
Clik here to view.

Anonymous Antisec hacks STRATFOR in Lulzxmas operation.

Anonymous Antisec hacks STRATFOR in Lulzxmas operation.Anonymous' Operation Antisec has claimed another victim. Strategic Forecasting's operations are offline and its customer details have been leaked....

View Article


Image may be NSFW.
Clik here to view.

Ridding oneself of Digital Trash to prevent Identity Theft

I think humans have a tendency to hoard. It is not unusual to undertake an annual house cleaning exercise to get rid of the items we once thought to be extremely important? Another characteristic is...

View Article

Image may be NSFW.
Clik here to view.

Easy login into Korean Point-of-Sale device

Some things are cross-culture it seems. Especially when it comes to trivial security mishaps. So I’m at a PoS terminal in a large department store in Seoul and while I’m waiting for the register to...

View Article

Image may be NSFW.
Clik here to view.

SBN Sponsor Post

Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l

View Article


Image may be NSFW.
Clik here to view.

Yes!

Yes! Jailbreak iOS 5.0.1 on iPhone 3GS, iPhone 4, iPad... UNTETHEREDGreat news, everyone! Now you can jailbreak your iPhone 3GS, iPhone 4, or iPad, with iOS 5.0.1 and reboot untethered. At last! Find...

View Article

Image may be NSFW.
Clik here to view.

Death by Thousand Clicks is Not Your Only Option

By Tara Savage, Senior Marketing Manager, BT Global Services The thought of engaging in social media campaigns is enough to send many companies into a feverish fit.  You know your company needs to be...

View Article

Image may be NSFW.
Clik here to view.

Legendary Hacker Kevin Mitnick Shares Security Tips

Kevin Mitnick was once the “most wanted” computer hacker in the world. After being nabbed by the FBI and doing his time, Mitnick became one of the good guys, helping businesses understand and address...

View Article


Image may be NSFW.
Clik here to view.

Top VPN Questions Answered

*Editor’s Note: This questions originally appeared in TechTarget’s SearchEnterpriseWan By Rainer Enders, CTO of Americas for NCP engineering Why should you monitor your Internet VPN? Monitoring your...

View Article


Image may be NSFW.
Clik here to view.

Guest Post: Virtualization Makes Everything Easier – Including Burning Bridges

The following guest post was provided by Richard Rees, CISSP, a Practice Manager for EMC Consulting’s Virtualization Security and Cloud Trust group. Email him here. The best thing about computers is...

View Article

Image may be NSFW.
Clik here to view.

Things to do in 2012 (2/5)

Continue to promote the use of encryption to protect information (i) in databases, (ii) in transit over the Internet, and (iii) on mobile devices and removable media. Identify and share the simplest...

View Article

Image may be NSFW.
Clik here to view.

5 Hottest Sec Jobs in 2012

As we start the new year out with all our resolutions … maybe one of your goals is to get a better job. Well earlier this month I came across an article that may provide some insight into some of the...

View Article

Image may be NSFW.
Clik here to view.

Blacklist Warnings for Users of the Stream-Video-Player WordPress Plugin

If you are using the plugin stream-video-player, it might be a good idea to disable this plugin for now. The plugin loads a Flash player from “http://rod.gs/_SVP/5.7.1896/player.swf?ver=1.3.2″, a...

View Article


Image may be NSFW.
Clik here to view.

Tangent lines for curves over a finite field

This morning I was talking to one of our core crypto team when one of our engineers walked by. When he heard what we were talking about he said something like, “Wait a minute, how can you talk about...

View Article

Image may be NSFW.
Clik here to view.

Wrong Tree

  Thoughtful security op-ed blog, via the Blogs@ACM section, in the Communications of the Association of Computing Machinery, and scribed by Jason Hong; postulating the current focus failures of the...

View Article


Image may be NSFW.
Clik here to view.

GSM now wide open to eavesdropping and tracking.

GSM now wide open to eavesdropping and tracking.The widely-used 2G GSM system for mobile phones is horribly insecure. This is not exactly news, but it's now worryingly easy for criminals to intercept...

View Article

Image may be NSFW.
Clik here to view.

Doghouse Diaries: Jim Typing

View Article


Image may be NSFW.
Clik here to view.

It’s (nearly) 2012 – So What? ;)

Well, it's that time of year again... time for a look back at 2011 and a look forward at the year to come. Of course, the first thing that comes to mind (to me, at least) for 2012 is the pending Mayan...

View Article

Image may be NSFW.
Clik here to view.

Career Advice Tuesday – “Infosec Leaders Need To Be Good Recruiters”

Today I am sharing an article that we wrote that appeared in Tech Target’s Infomraiton Security Magazine.  The topic focuses on life on “The Other Side of the Desk”- becoming an effective recruiter in...

View Article

Image may be NSFW.
Clik here to view.

SBN Sponsor Post

Register for the RSA Conference December 7th Webcast: Metrics are Bunk!? The Zombie Apocolypse, Baseball, and Security Metrics.http://bit.ly/s2FJ1x

View Article
Browsing all 37364 articles
Browse latest View live