9 Old Tech Analogies, Meaningless to Young Whippersnappers . Great fun by +...
9 Old Tech Analogies, Meaningless to Young Whippersnappers.Great fun by +Carol Pinchefsky in #HPIO UK for +HPUK...9 Old Tech Analogies, Meaningless to Young Whipper... - Input Output
View ArticleUsing ElasticSearch Bulk Mode with rsyslog
Rsyslog's omelasticsearch plugin now supports bulk mode. With bulk mode, message processing is much faster, especially if large loads are to be processed. Bulk mode works with rsyslog's batching...
View Articlehow to use mmjsonparse only for select messages
Rsyslog's mmjsonparse module permits to parse JSON base data (actually expecting CEE-format). This message modification module is implemented via the output plugin interface, which provides some nice...
View ArticleFake Twitter Confirmation Email Points to Blackhole Exploit
Yesterday, we wrote about the return of Amazon spam, and how criminals behind this campaign led users to have their software exploited via the Blackhole exploit kit, especially if they’re not properly...
View ArticleIncite 6/13/2012: Tweeting Idiocy
It’s easy to think that the main contribution of social media tools like Twitter and Facebook is to connect you more tightly to your friends, colleagues, and family. Which is true. But don’t...
View ArticleFree virus removal tool: 27% found malware missed by existing anti-virus
Sophos's free virus removal tool has been updated and reissued, thanks to feedback from Naked Security readers. It now is 20% faster and has better detection and clean-up capabilities.
View Articleavast! Free Antivirus User Wins 7 Days in Paradise
AVAST Software Announces Winner of its Latest Facebook-Based Promotion To promote the release of new avast! version 7, AVAST Software ran a promotion for a lucky user to win seven days in ‘paradise’,...
View ArticleSBN Sponsor Post
Register for RSA Conference Europe: register early and save £225!http://bit.ly/HvhYTY
View ArticleRisk Management: Are you Walking the Risk Talk?
Whether I’m talking to a customer, prospect or a friend in the information security community, the conversation will often lead us to discuss risk management. Why has this topic become a common topic...
View ArticleMicrosoft and Yahoo are selling us to politicians, Facebook and Google are...
Microsoft and Yahoo are selling politicians the ability to target online ads to voters by name, zip code and other data they've collected from us.
View ArticleConfidential – By John Nolan
The latest Social-Engineer Podcast’s guest was John Nolan. He is a world renowned author and expert on Elicitation and covert actions. He came on Episode 35 to teach us how to get anything from any...
View ArticleHotmail Password Reset Fail in Pictures
I’ve been internally brewing over the weakness of password reset questions for some time now. There have been many high profile examples the past few years where attackers have easily gained...
View ArticleGiant snakes eating zookeepers and unwatchable videos – Facebook hit again by...
Facebook users are once again suffering from an onslaught of clickjacking survey scams, designed to fool them into unwittingly saying they "Like" a link to drive web traffic that simply fills the...
View ArticleThe Three Myths of the Availability Threat
Availability – aka the big “A” – is often the overlooked leg of the CIA triad (the others being Confidentiality and Integrity). Perhaps one contributing factor is the common belief among security...
View ArticleWhy BYOD is the best problem IT departments ever faced
The rise and rise of BYOD has to be seen as a welcome challenge to organisations. A challenge because it undoubtedly brings security concerns, and welcome because the opportunities come thick and fast...
View ArticleVoltage goes mobile!
It looks like we've finally released the version of SecureMail for iOS and Android that people have been asking for for quite a while. (Unfortunately, BlackBerry users like me will have to wait until...
View ArticleVermont Updates Data Breach Notification Laws
Updates to the Vermont Data Protection and Breach Notification laws came into effect in May 2012. As readers of my posts know (yo G!), although I seem to play one in this blog, IANAL. With that said,...
View ArticleHak5 Toys
Hello all I have been a very busy bee over the last few weeks; I recieved my Hak5 toys about the same time PwnPlug updated their release. Sorry Hak5 but since I owned the Pwnplug first I out the toys...
View ArticleCloudPassage Introduces Halo GhostPorts SMS
Secure saccess control for any application on any server in any cloud using any mobile phone as the authentication device
View ArticleApple, Oracle Ship Java Security Updates
There must have been some rare planetary alignment yesterday, because the oddest thing happened: Apple and Oracle both shipped software updates for the same Java security flaws on the very same day....
View Article