Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Security and Compliance in a Virtualized World

Ski Mask, by Dave Wasson Are security and compliance hindering your ability to comply with PCI DSS or any other number of compliance initiatives? Check out this BUZZ Talk from EMC World where Paul...

View Article


Image may be NSFW.
Clik here to view.

“Catch Me If You Can” Trojan Banker Zeus Strikes Again (Part 4 of 5)

This is the fourth part in a series of blogs. The prior blogs describe the technical details of the tools and the techniques used by the cyber gang to gain control of the infected machines. “Catch Me...

View Article


Image may be NSFW.
Clik here to view.

Q2 Update from HP Software Security Research

It is with immense pleasure that we announce the first combined update from HP Software Security Research to support both HP WebInspect and HP Fortify solutions. The release includes new versions of...

View Article

Image may be NSFW.
Clik here to view.

‘Flame’ Malware Prompts Microsoft Patch

Microsoft has issued an emergency security update to block an avenue of attack first seen in “Flame,” a newly-discovered, sophisticated malware strain that experts believe was designed to steal data...

View Article

Image may be NSFW.
Clik here to view.

Attack vectors on mobile devices 3: the future of mobile threats

Read previous: Attack vectors on mobile devices 2: Android and iOS security Final part of Tam Hanna’s presentation outlines his investigation into RenRen phishing, WAP scams, HTC Bluetooth FTP issue,...

View Article


Image may be NSFW.
Clik here to view.

NIST Reports 23 “Open Issues” in Cloud Computing

Last week NIST released Special Publication (SP) 800-146, Cloud Computing Synopsis and Recommendations. Weighing in at 81 pages, this document is the follow-on to infamous SP 800-145 that defines what...

View Article

Image may be NSFW.
Clik here to view.

Reset your Facebook password – and visit WikiPharmacy!

Using phony Facebook emails to draw recipients to pharmacy websites is not a new trick.  But this is no ordinary Viagra shop – it’s the WikiPharmacy!  The phony Facebook emails and the pharmacy...

View Article

Image may be NSFW.
Clik here to view.

IT Risk Mgt. & Security Survey- Donation to savethechildren.org for your...

Hi friends in IT Risk Mgt. & Security: In an effort to keep building great products, I’ve crafted a brief survey to gather input and impressions around Visibility into Digital Behavior- how...

View Article


Image may be NSFW.
Clik here to view.

Bypassing Ethiopian Censors

Ethiopia, like many countries now, are actively censoring what people can see online. The folks at Tor have posted a workaround to allow for bypassing Ethiopian censors. From Tor Project: A few days...

View Article


Image may be NSFW.
Clik here to view.

Coming soon: a billion lines of code

According to the report Ultra-Large Scale Systems: The Software Challenge of the Future from Carnegie-Mellon's Software Engineering Institute, software is going to get worse before it gets better. One...

View Article

Image may be NSFW.
Clik here to view.

Cyber war == escalating physical and human collateral damage. To civilians.

As the news wave broke on Friday; from the NY Times; then across the technology sector and spread around the world (a sample of articles from Ars Technica,  PC World, PC Mag,  Reuters, Ireland, the UK,...

View Article

Image may be NSFW.
Clik here to view.

Bampton Traditional Morris Dancers , 4th June 2012, at Bampton House… Video:...

Bampton Traditional Morris Dancers, 4th June 2012, at Bampton House...Video: Bampton Traditional Morris Dancers, June 2012

View Article

Image may be NSFW.
Clik here to view.

NLRB Continues to Scrutinize Social Media Policies

The acting general counsel of the National Labor Relations Board has issued several reports in just the past year highlighting the importance of drafting social media policies to avoid trampling on...

View Article


Image may be NSFW.
Clik here to view.

Plausible Deniability, End of

Superbly scrivened ArsTechnica post, detailing the latest on the so-called Stuxnet fess-up. Can these people (the United States of America's Executive Branch) be any more naive. Poor grammar,...

View Article

Image may be NSFW.
Clik here to view.

The Game of Cybersecurity

In his keynote at EMCworld 2012  in Las Vegas, Pat Gelsinger proposed a tongue-in-cheek equation for the “physics of information technology”.  He also used analogies drawn from the world of physics to...

View Article


Image may be NSFW.
Clik here to view.

Where You Want to Be This Week for 06-04-2012

Where do you want to be this week? Now you’ll always know with our “Where You Want to Be This Week” feature, which will tell you about infosec meetups happening in your local area as of Sunday night....

View Article

Image may be NSFW.
Clik here to view.

Interview with Josh Corman at SOURCE Boston 2012 – Part 1

This year’s SOURCE Boston gave us a chance to sit down and talk appsec with Josh Corman, Akamai Technologies’ Director of Security Intelligence. Our three part video interview primarily focused on...

View Article


Image may be NSFW.
Clik here to view.

Nitrozac and Snaggy: Klout, Emphatic

via the comic genius of Nitrozac and Snaggy at The Joy of Tech™

View Article

Image may be NSFW.
Clik here to view.

Now IronSpider – Go hard or Go home, I’m an Ironman!

Probably in the same period I started at Trustwave SpiderLabs I decided to start my training for an Ironman race. First what is an Ironman? An Ironman Triathlon is one of a series of long-distance...

View Article

Image may be NSFW.
Clik here to view.

Collaborating On Ways to Advance Internet Health

Almost exactly one year ago, I attended the EastWest Institute’s Worldwide Cybersecurity Summit in London and in a working group of industry leaders, distinguished scientists and key government...

View Article
Browsing all 37364 articles
Browse latest View live