Guide to HTML5 Web Security
Further to my previous notes about HTML 5 security, a superb reference document was published earlier this month. Michael Schmidt (Compass Security) wrote his master's thesis about HTML5 security in...
View ArticleAnonymous Antisec hacks STRATFOR in Lulzxmas operation.
Anonymous Antisec hacks STRATFOR in Lulzxmas operation.Anonymous' Operation Antisec has claimed another victim. Strategic Forecasting's operations are offline and its customer details have been leaked....
View ArticleRidding oneself of Digital Trash to prevent Identity Theft
I think humans have a tendency to hoard. It is not unusual to undertake an annual house cleaning exercise to get rid of the items we once thought to be extremely important? Another characteristic is...
View ArticleEasy login into Korean Point-of-Sale device
Some things are cross-culture it seems. Especially when it comes to trivial security mishaps. So I’m at a PoS terminal in a large department store in Seoul and while I’m waiting for the register to...
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticleYes!
Yes! Jailbreak iOS 5.0.1 on iPhone 3GS, iPhone 4, iPad... UNTETHEREDGreat news, everyone! Now you can jailbreak your iPhone 3GS, iPhone 4, or iPad, with iOS 5.0.1 and reboot untethered. At last! Find...
View ArticleDeath by Thousand Clicks is Not Your Only Option
By Tara Savage, Senior Marketing Manager, BT Global Services The thought of engaging in social media campaigns is enough to send many companies into a feverish fit. You know your company needs to be...
View ArticleLegendary Hacker Kevin Mitnick Shares Security Tips
Kevin Mitnick was once the “most wanted” computer hacker in the world. After being nabbed by the FBI and doing his time, Mitnick became one of the good guys, helping businesses understand and address...
View ArticleTop VPN Questions Answered
*Editor’s Note: This questions originally appeared in TechTarget’s SearchEnterpriseWan By Rainer Enders, CTO of Americas for NCP engineering Why should you monitor your Internet VPN? Monitoring your...
View ArticleGuest Post: Virtualization Makes Everything Easier – Including Burning Bridges
The following guest post was provided by Richard Rees, CISSP, a Practice Manager for EMC Consulting’s Virtualization Security and Cloud Trust group. Email him here. The best thing about computers is...
View ArticleThings to do in 2012 (2/5)
Continue to promote the use of encryption to protect information (i) in databases, (ii) in transit over the Internet, and (iii) on mobile devices and removable media. Identify and share the simplest...
View Article5 Hottest Sec Jobs in 2012
As we start the new year out with all our resolutions … maybe one of your goals is to get a better job. Well earlier this month I came across an article that may provide some insight into some of the...
View ArticleBlacklist Warnings for Users of the Stream-Video-Player WordPress Plugin
If you are using the plugin stream-video-player, it might be a good idea to disable this plugin for now. The plugin loads a Flash player from “http://rod.gs/_SVP/5.7.1896/player.swf?ver=1.3.2″, a...
View ArticleTangent lines for curves over a finite field
This morning I was talking to one of our core crypto team when one of our engineers walked by. When he heard what we were talking about he said something like, “Wait a minute, how can you talk about...
View ArticleWrong Tree
Thoughtful security op-ed blog, via the Blogs@ACM section, in the Communications of the Association of Computing Machinery, and scribed by Jason Hong; postulating the current focus failures of the...
View ArticleGSM now wide open to eavesdropping and tracking.
GSM now wide open to eavesdropping and tracking.The widely-used 2G GSM system for mobile phones is horribly insecure. This is not exactly news, but it's now worryingly easy for criminals to intercept...
View ArticleIt’s (nearly) 2012 – So What? ;)
Well, it's that time of year again... time for a look back at 2011 and a look forward at the year to come. Of course, the first thing that comes to mind (to me, at least) for 2012 is the pending Mayan...
View ArticleCareer Advice Tuesday – “Infosec Leaders Need To Be Good Recruiters”
Today I am sharing an article that we wrote that appeared in Tech Target’s Infomraiton Security Magazine. The topic focuses on life on “The Other Side of the Desk”- becoming an effective recruiter in...
View ArticleSBN Sponsor Post
Register for the RSA Conference December 7th Webcast: Metrics are Bunk!? The Zombie Apocolypse, Baseball, and Security Metrics.http://bit.ly/s2FJ1x
View Article