Weekly Rewind – Top Industry News, ExploitSearch, DNSChanger, & More…
If you missed anything or happened to be offline this past week, we hope you find this post useful as a quick reference. For those readers that may not have noticed, I actually tack on a bit of...
View ArticleYou Lose America. CISPA Passes 248-168
In a rather bizarre twist today the vote on the CIPSA bill was moved forward and hurriedly pushed through. First off, what is the Cyber Intelligence Sharing and Protection Act or CISPA? From Wikipedia...
View ArticleSBN Sponsor Post
Submit a session proposal to present at RSA Conference Europe 2012 – Call for Speakers opens April 10th.http://bit.ly/fcI5QA
View ArticleFriday Summary, TSA Edition- April 26, 2012
Rich here. Being in an airport as I write this, I’m going to eschew my normal “personal” intro and spend a little time talking about our favorite security show- Airport Screening Foibles. (But before...
View ArticleA 419 Scam and an Unintended Surprise
Given the long history of advance-fee fraud, it is safe to assume that we’re more or less aware (if not familiar) with what 419 scams are. For those who are not, 419 scams typically come to users in...
View ArticleAt the Edge of the Abyss
Tablet Magazine has posted a book review for a new English version of At the Edge of the Abyss: A Concentration Camp Diary, 1943-1944. Three things mark At the Edge of the Abyss as an utterly...
View ArticleGuest Post – Adam Maxwell – "Popping my cherry – B-Sides London 2012"
[Today our guest post is by Adam Maxwell (@catalyst256). He registered for his first security conference, BSides London, and then decided to take it one step further and signed up to be a volunteer....
View ArticleHow to remove Facebook malware
Malware distribution in social networks appears to be turning into a steadily growing trend. This tutorial encompasses the description of the most common patterns of malware propagation on Facebook,...
View ArticleMobile phone carriers oppose law requiring warrants for location data
The proposed US bill doesn't stop the carriers from handing over location data, but it does require that police get a warrant first. So what is CTIA's problem with it?
View ArticleInfosec Europe 2012 Review
The end of another week, and the end of Infosec Europe at Earls Court. Europe's biggest free three day event seemed as popular as ever, with an estimated 10k visitors over the three days (most...
View ArticleUbuntu Linux 12.04 download: Precise Pangolin. #ITBW by +Richi Jennings for...
Ubuntu Linux 12.04 download: Precise Pangolin. #ITBW by +Richi Jennings for +Computerworld... http://blogs.computerworld.com/20092/ubuntu_linux_12_04_download_precise_pangolin
View ArticleMicrosoft rushes out fix after hackers change passwords to hack Hotmail accounts
Microsoft says it has fixed a serious vulnerability in Hotmail, that was allowing hackers to reset account passwords, locking out the account's real owner and giving attackers access to users' inboxes.
View ArticleShould you Warn Employees you're Geo-Tracking them? Friday's #HPIO UK...
Should you Warn Employees you're Geo-Tracking them? Friday's #HPIO UK Editor's blog post for +HPUK......
View ArticleFree Ray-Bans and TOMS shoes scams hit Facebook
Have you seen a message on Facebook saying that free pairs of Ray-Bans or TOMS shoes are being given away to users? Don't believe it.
View ArticleSBN Sponsor Post
See what you missed at RSA Conference 2012 in San Francisco. View keynotes and session presentations.http://bit.ly/H2OSbR
View ArticleOpinion: America is under cyber attack, so what should we do?
Yesterday, the US House of Representatives announced “cybersecurity week,” kicking it off with a Subcommittee Hearing entitled "America is Under Cyber Attack: Why Urgent Action is Needed." Is using...
View ArticleYikes. +Robert Mitchell suffered a really ugly Microsoft cloud outage...
Yikes. +Robert Mitchell suffered a really ugly Microsoft cloud outage here.[via +Paul McNamara]
View ArticleFrom LOW to PWNED [3] JBoss/Tomcat server-status
Several (tm) months back I did my talk on "From LOW to PWNED" at hashdays and BSides Atlanta.The slides were published here and the video from hashdays is here, no video for BSides ATL.I consistently...
View ArticlePython-based malware attack targets Macs. Windows PCs also under fire
A new malware attack is targeting Mac computers with a Python-based backdoor Trojan. And Windows computers aren't getting away scott free either.
View ArticleBringing the Unsexy Back: The Process of Selling SE Penetration Tests
By Chris Hadnagy For the past few months, I’ve brought you articles on launching your career as a social engineer, the psychology and history behind hacking humans and even some scams you can pull on...
View Article