Security and Compliance in a Virtualized World
Ski Mask, by Dave Wasson Are security and compliance hindering your ability to comply with PCI DSS or any other number of compliance initiatives? Check out this BUZZ Talk from EMC World where Paul...
View Article“Catch Me If You Can” Trojan Banker Zeus Strikes Again (Part 4 of 5)
This is the fourth part in a series of blogs. The prior blogs describe the technical details of the tools and the techniques used by the cyber gang to gain control of the infected machines. “Catch Me...
View ArticleQ2 Update from HP Software Security Research
It is with immense pleasure that we announce the first combined update from HP Software Security Research to support both HP WebInspect and HP Fortify solutions. The release includes new versions of...
View Article‘Flame’ Malware Prompts Microsoft Patch
Microsoft has issued an emergency security update to block an avenue of attack first seen in “Flame,” a newly-discovered, sophisticated malware strain that experts believe was designed to steal data...
View ArticleAttack vectors on mobile devices 3: the future of mobile threats
Read previous: Attack vectors on mobile devices 2: Android and iOS security Final part of Tam Hanna’s presentation outlines his investigation into RenRen phishing, WAP scams, HTC Bluetooth FTP issue,...
View ArticleNIST Reports 23 “Open Issues” in Cloud Computing
Last week NIST released Special Publication (SP) 800-146, Cloud Computing Synopsis and Recommendations. Weighing in at 81 pages, this document is the follow-on to infamous SP 800-145 that defines what...
View ArticleReset your Facebook password – and visit WikiPharmacy!
Using phony Facebook emails to draw recipients to pharmacy websites is not a new trick. But this is no ordinary Viagra shop – it’s the WikiPharmacy! The phony Facebook emails and the pharmacy...
View ArticleIT Risk Mgt. & Security Survey- Donation to savethechildren.org for your...
Hi friends in IT Risk Mgt. & Security: In an effort to keep building great products, I’ve crafted a brief survey to gather input and impressions around Visibility into Digital Behavior- how...
View ArticleBypassing Ethiopian Censors
Ethiopia, like many countries now, are actively censoring what people can see online. The folks at Tor have posted a workaround to allow for bypassing Ethiopian censors. From Tor Project: A few days...
View ArticleComing soon: a billion lines of code
According to the report Ultra-Large Scale Systems: The Software Challenge of the Future from Carnegie-Mellon's Software Engineering Institute, software is going to get worse before it gets better. One...
View ArticleCyber war == escalating physical and human collateral damage. To civilians.
As the news wave broke on Friday; from the NY Times; then across the technology sector and spread around the world (a sample of articles from Ars Technica, PC World, PC Mag, Reuters, Ireland, the UK,...
View ArticleBampton Traditional Morris Dancers , 4th June 2012, at Bampton House… Video:...
Bampton Traditional Morris Dancers, 4th June 2012, at Bampton House...Video: Bampton Traditional Morris Dancers, June 2012
View ArticleNLRB Continues to Scrutinize Social Media Policies
The acting general counsel of the National Labor Relations Board has issued several reports in just the past year highlighting the importance of drafting social media policies to avoid trampling on...
View ArticlePlausible Deniability, End of
Superbly scrivened ArsTechnica post, detailing the latest on the so-called Stuxnet fess-up. Can these people (the United States of America's Executive Branch) be any more naive. Poor grammar,...
View ArticleThe Game of Cybersecurity
In his keynote at EMCworld 2012 in Las Vegas, Pat Gelsinger proposed a tongue-in-cheek equation for the “physics of information technology”. He also used analogies drawn from the world of physics to...
View ArticleWhere You Want to Be This Week for 06-04-2012
Where do you want to be this week? Now you’ll always know with our “Where You Want to Be This Week” feature, which will tell you about infosec meetups happening in your local area as of Sunday night....
View ArticleInterview with Josh Corman at SOURCE Boston 2012 – Part 1
This year’s SOURCE Boston gave us a chance to sit down and talk appsec with Josh Corman, Akamai Technologies’ Director of Security Intelligence. Our three part video interview primarily focused on...
View ArticleNitrozac and Snaggy: Klout, Emphatic
via the comic genius of Nitrozac and Snaggy at The Joy of Tech™
View ArticleNow IronSpider – Go hard or Go home, I’m an Ironman!
Probably in the same period I started at Trustwave SpiderLabs I decided to start my training for an Ironman race. First what is an Ironman? An Ironman Triathlon is one of a series of long-distance...
View ArticleCollaborating On Ways to Advance Internet Health
Almost exactly one year ago, I attended the EastWest Institute’s Worldwide Cybersecurity Summit in London and in a working group of industry leaders, distinguished scientists and key government...
View Article