Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Liquidmatrix Security Digest Podcast – Episode 1

Previously on the Liquidmatrix Security Digest Podcast… There was some talk, it was kinda nice. People said “do it again!” and now you’re caught up. Welcome back to the Liquidmatrix Security Digest...

View Article


Image may be NSFW.
Clik here to view.

Security Is Sneaking In With the Crowd At SMBs

An interesting article by Kevin Casey over at Information Week seeks to throw water on the idea that SMBs are lax on security. Casey points to a recent study by IDC that says SMB spending on security...

View Article


Image may be NSFW.
Clik here to view.

Hacker Breaches US Navy Site As Warning To The Government

A hacker called Comrade (.c0mrade) claimed to have breached the US Navy’s official site and dumped a partial list of personal information and data on Pastebin. The hack included the data profiles of...

View Article

Image may be NSFW.
Clik here to view.

An Ounce of Prevention: Mandiant’s Managed Defense

My kids used to think they were invincible.  A few cuts and scrapes later, they learned better.  Soon, they’ll think they know everything.  Heck, they probably already do.  And once they finally accept...

View Article

Image may be NSFW.
Clik here to view.

Recent Communication Failure – No Email Responses

Hi Everyone We have been getting a lot of inquiries lately on the lack of our response via email and I wanted to take a minute to apologize. It turns out that there was a configuration issue between...

View Article


Image may be NSFW.
Clik here to view.

Navigating a Sea of Cyber Security Legislation

For once, Republicans, Democrats, Independents and the people of the United States all agree on something: We need better protection from cyber attack. We’ve all seen quotes and statistics declaring...

View Article

Image may be NSFW.
Clik here to view.

Cybercriminals infiltrate the music industry by offering full newly released...

By Dancho Danchev Next to commodity underground goods and services such as managed spam, harvested email databases, boutique cybercrime-friendly services, services offering access to hacked PCs,...

View Article

Image may be NSFW.
Clik here to view.

Thinking Beyond “The Cloud”

As the conversations from FIRE sink in, I start to see IT evolve away from the conventional (and highly standardized) data center design to more advanced and highly-tuned architectures customized for...

View Article


Image may be NSFW.
Clik here to view.

US Government, Stuxnet, and Cyber-Attacks: Caveat Coder

New reports tying the Stuxnet worm to the US government has many people asking questions. What exactly is a cyberattack? Does conducting a cyberattack have the same implications as a physical military...

View Article


Image may be NSFW.
Clik here to view.

Flame malware used man-in-the-middle attack against Windows Update

Microsoft has released an emergency update for Windows revoking digital certificates that could be used to impersonate the Windows Update security service. The Flame malware exploited flaws related to...

View Article

Image may be NSFW.
Clik here to view.

Looking for "Guest" authors!!

Hello everyone, I'm looking for guest authors to contribute to my blog www.frontlinesentinel.com. If you're interested in writing about information security topics please contact me at...

View Article

Image may be NSFW.
Clik here to view.

US Federal Employees’ Information Compromised

We’ve been reading about this for the past week or so. As a one-time federal employee with a TSP account, I imagine my stuff is out there now.  Not good. Of course I’m guessing that my data was...

View Article

Image may be NSFW.
Clik here to view.

InfoSec Daily Podcast Episode 684

Episode 684 - China not at fault, Microsoft Certified Flame, SwaggSec pwns, Internet Security Fail, EFF Privacy Report, and Reveton Ransomware

View Article


Image may be NSFW.
Clik here to view.

Using Facebook without being tracked

I’ve always hated the way Facebook has endeavored to track every single action their users do.  Which is funny, considering how much of my life I put on Twitter.  But the main difference between the...

View Article

Image may be NSFW.
Clik here to view.

Book Review: We Are Anonymous

Parmy Olson, Forbes’ London bureau chief, has just completed a detailed history of Anonymous, Lulzsec and the origins of hacktivism. The book is now available on Amazon. Olson’s approach? Write a...

View Article


Image may be NSFW.
Clik here to view.

Overcoming Anti-Forensics & The Forensics Challenge

The fine folks at LMG tell us all about a fun challenge and give you some technical tips on network forensics: Episode 290 Show Notes Episode 290 Part 1 (mp3) Episode 290 Part 2 (mp3) Tune in to...

View Article

Image may be NSFW.
Clik here to view.

Fun With SQL Injection – Special Guest Allison Nixon

SQL Injection Primer: SQL Injection Examples: Episode 290 Show Notes Episode 290 Part 1 (mp3) Episode 290 Part 2 (mp3) Tune in to PaulDotCom Security Weekly TV, Hack Naked TV, and Hack Naked At Night...

View Article


Image may be NSFW.
Clik here to view.

Non-English (Dutch) Mastercard spam

Rough translation…   Spam email: As always, when you hover over a link, it becomes obvious that the email is not legitimate: If you give in to temptation (of course, never do so unless you are working...

View Article

Image may be NSFW.
Clik here to view.

Exploiting RFI Using Metasploit

Shout out to the fine folks at Offensive Security who wrote Metasploit Unleashed: Episode 290 Show Notes Episode 290 Part 1 (mp3) Episode 290 Part 2 (mp3) Tune in to PaulDotCom Security Weekly TV, Hack...

View Article

Image may be NSFW.
Clik here to view.

Attackers Hit Weak Spots in 2-Factor Authentication

An attack late last week that compromised the personal and business Gmail accounts of Matthew Prince, chief executive of Web content delivery system CloudFlare, revealed a subtle but dangerous...

View Article
Browsing all 37364 articles
Browse latest View live