Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

CISSP Reloaded–Domain 7: Applications and Systems Development

This is the 7th part on my CISSP Reloaded where I am revisiting the 10 CISSP domains I studied for many years ago to see what has changed and how much of it I have retained as well as adding in my own...

View Article


Image may be NSFW.
Clik here to view.

Improving our risk model

One of the more fun parts of designing your own software is watching it evolve as you get smarter. Explicit feedback says one thing, observing people says another, software gets used, ignored, or used...

View Article


Image may be NSFW.
Clik here to view.

Global Payments Security Breach Update – 1.5 Million Credit Card Numbers...

The debacle over U.S. Credit Card processing company Global Payments security breach and stolen credit numbers continued yesterday with a press release from the company answering questions. Global...

View Article

Image may be NSFW.
Clik here to view.

Thank you Aaron

Posted by Scott Lambert Thank you Aaron In a recent tweet, some of you may have seen that Aaron Portnoy, the head of our Zero Day Initiative program has decided to move on to other opportunities....

View Article

Image may be NSFW.
Clik here to view.

OpenX Promises Fix for Rogue Ads Bug

Hackers are actively exploiting a dangerous security vulnerability in OpenX — an online ad-serving solution for Web sites — to run booby-trapped ads that serve malware and browser exploits across...

View Article


Image may be NSFW.
Clik here to view.

Challenge-Response Authentication? No Problem.

The following post is brought to you by one of HP's most talented presales consultants, Hans Enders, in collaboration with Steve Hardeman, Jeremy Brooks, and several other developers within the...

View Article

Image may be NSFW.
Clik here to view.

ICSA Labs Healthcare Program – MU UPDATE

ICSA Labs' Healthcare Team provides a Meaningful Use Update which includes information related to the approaching deadline for submitting public comment to ONC as well as several federal resources that...

View Article

Image may be NSFW.
Clik here to view.

Facebook Steps Up Security Efforts

There’s no doubt that social media as emerged as a major conduit through which malware is now be distributed across the Internet. What’s nice to see is that the owners of social networking sites are...

View Article


Image may be NSFW.
Clik here to view.

Check Point Ups Free Anti-Malware Game

One of the core issues with security is that the quality of the security software deployed by individuals tends to vary widely. Some people don’t use and security software, while others opt to use free...

View Article


Image may be NSFW.
Clik here to view.

Rant & Poll: Can We Just Let this Google Wifi Slurping Thing Die?

In the past few weeks Google has been back in the news for their whole wifi slurping mess. First it was the FCC slap on the wrist $25K fine. More recently, Google disclosed the name of the programmer...

View Article

Image may be NSFW.
Clik here to view.

InfoSec Daily Podcast Episode 658

Episode 658 - ESX Patch, Healthcare Struggles, Iran Admits to Attacks, Skype SuperNodes, and Chrome

View Article

Image may be NSFW.
Clik here to view.

REVIEW: “Dark Market: CyberThieves, CyberCops, and You”, Misha Glenny

BKDRKMKT.RVW 20120201 “Dark Market: CyberThieves, CyberCops, and You”, Misha Glenny, 2011, 978-0-88784-239-9, C$29.95 %A   Misha Glenny %C   Suite 801, 110 Spadina Ave, Toronto, ON Canada  M5V 2K4 %D...

View Article

Image may be NSFW.
Clik here to view.

SBN Sponsor Post

Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l

View Article


Image may be NSFW.
Clik here to view.

Cryptography – As Strong As Your Weakest Link

Cryptography is as old as communication itself in many respects, with people (and even animals) developing mechanisms to shield messages from those who are not trusted.  One of the most common that has...

View Article

Image may be NSFW.
Clik here to view.

RSA Archer eGRC Platform Expanded

Newest release includes a Regulatory Management solution

View Article


Image may be NSFW.
Clik here to view.

How Mobile Apps are Invading Your Privacy Infographic

Every week it seems like there is a new story about a popular mobile application having privacy issues that put its users at risk. With millions of mobile apps receiving billions of downloads, it is...

View Article

Image may be NSFW.
Clik here to view.

Plixer And Enterasys Networks Enhance BYOD Security And Reporting

Webcast reveals methods to leverage NetFlow reporting and mobile IAM features

View Article


Image may be NSFW.
Clik here to view.

Hotel booking confirmation emails aim to infect your computer. Watch out!

Be on your guard against emails that claim to be about a hotel booking that you never made - you could be putting your computer at risk of infection by malware.

View Article

Image may be NSFW.
Clik here to view.

Symplified And Qubera Partner On Identity Management For Cloud, SaaS And...

Qubera Solutions will provide Symplified solutions to customers that need to unify IAM for premises-based, cloud, and mobile applications

View Article

Image may be NSFW.
Clik here to view.

List of Domains Hosting Webshells for Timthumb Attacks

We have been tracking TimThumb related attacks for a while and they are still at full force (yes, some people are still using the outdated versions and getting compromised). Just for the month of May,...

View Article
Browsing all 37364 articles
Browse latest View live