Liquidmatrix Security Digest Podcast – Episode 1
Previously on the Liquidmatrix Security Digest Podcast… There was some talk, it was kinda nice. People said “do it again!” and now you’re caught up. Welcome back to the Liquidmatrix Security Digest...
View ArticleSecurity Is Sneaking In With the Crowd At SMBs
An interesting article by Kevin Casey over at Information Week seeks to throw water on the idea that SMBs are lax on security. Casey points to a recent study by IDC that says SMB spending on security...
View ArticleHacker Breaches US Navy Site As Warning To The Government
A hacker called Comrade (.c0mrade) claimed to have breached the US Navy’s official site and dumped a partial list of personal information and data on Pastebin. The hack included the data profiles of...
View ArticleAn Ounce of Prevention: Mandiant’s Managed Defense
My kids used to think they were invincible. A few cuts and scrapes later, they learned better. Soon, they’ll think they know everything. Heck, they probably already do. And once they finally accept...
View ArticleRecent Communication Failure – No Email Responses
Hi Everyone We have been getting a lot of inquiries lately on the lack of our response via email and I wanted to take a minute to apologize. It turns out that there was a configuration issue between...
View ArticleNavigating a Sea of Cyber Security Legislation
For once, Republicans, Democrats, Independents and the people of the United States all agree on something: We need better protection from cyber attack. We’ve all seen quotes and statistics declaring...
View ArticleCybercriminals infiltrate the music industry by offering full newly released...
By Dancho Danchev Next to commodity underground goods and services such as managed spam, harvested email databases, boutique cybercrime-friendly services, services offering access to hacked PCs,...
View ArticleThinking Beyond “The Cloud”
As the conversations from FIRE sink in, I start to see IT evolve away from the conventional (and highly standardized) data center design to more advanced and highly-tuned architectures customized for...
View ArticleUS Government, Stuxnet, and Cyber-Attacks: Caveat Coder
New reports tying the Stuxnet worm to the US government has many people asking questions. What exactly is a cyberattack? Does conducting a cyberattack have the same implications as a physical military...
View ArticleFlame malware used man-in-the-middle attack against Windows Update
Microsoft has released an emergency update for Windows revoking digital certificates that could be used to impersonate the Windows Update security service. The Flame malware exploited flaws related to...
View ArticleLooking for "Guest" authors!!
Hello everyone, I'm looking for guest authors to contribute to my blog www.frontlinesentinel.com. If you're interested in writing about information security topics please contact me at...
View ArticleUS Federal Employees’ Information Compromised
We’ve been reading about this for the past week or so. As a one-time federal employee with a TSP account, I imagine my stuff is out there now. Not good. Of course I’m guessing that my data was...
View ArticleInfoSec Daily Podcast Episode 684
Episode 684 - China not at fault, Microsoft Certified Flame, SwaggSec pwns, Internet Security Fail, EFF Privacy Report, and Reveton Ransomware
View ArticleUsing Facebook without being tracked
I’ve always hated the way Facebook has endeavored to track every single action their users do. Which is funny, considering how much of my life I put on Twitter. But the main difference between the...
View ArticleBook Review: We Are Anonymous
Parmy Olson, Forbes’ London bureau chief, has just completed a detailed history of Anonymous, Lulzsec and the origins of hacktivism. The book is now available on Amazon. Olson’s approach? Write a...
View ArticleOvercoming Anti-Forensics & The Forensics Challenge
The fine folks at LMG tell us all about a fun challenge and give you some technical tips on network forensics: Episode 290 Show Notes Episode 290 Part 1 (mp3) Episode 290 Part 2 (mp3) Tune in to...
View ArticleFun With SQL Injection – Special Guest Allison Nixon
SQL Injection Primer: SQL Injection Examples: Episode 290 Show Notes Episode 290 Part 1 (mp3) Episode 290 Part 2 (mp3) Tune in to PaulDotCom Security Weekly TV, Hack Naked TV, and Hack Naked At Night...
View ArticleNon-English (Dutch) Mastercard spam
Rough translation… Spam email: As always, when you hover over a link, it becomes obvious that the email is not legitimate: If you give in to temptation (of course, never do so unless you are working...
View ArticleExploiting RFI Using Metasploit
Shout out to the fine folks at Offensive Security who wrote Metasploit Unleashed: Episode 290 Show Notes Episode 290 Part 1 (mp3) Episode 290 Part 2 (mp3) Tune in to PaulDotCom Security Weekly TV, Hack...
View ArticleAttackers Hit Weak Spots in 2-Factor Authentication
An attack late last week that compromised the personal and business Gmail accounts of Matthew Prince, chief executive of Web content delivery system CloudFlare, revealed a subtle but dangerous...
View Article