Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

New Security Checks and Features Added to Acunetix Web Vulnerability Scanner

We are pleased to announce an updated build of Acunetix Web Vulnerability Scanner 8 (WVS 8). The new build 20120613 offers a number of new security checks, new scanner funtionalities, improvements and...

View Article


Image may be NSFW.
Clik here to view.

Spamvertised ‘Your Amazon.com order confirmation’ emails serving client-side...

By Dancho Danchev Everyone uses Amazon! At least that’s what the cybercriminals are hoping.  Cybercriminals are currently spamvertising millions of emails impersonating Amazon.com Inc. in an attempt to...

View Article


Image may be NSFW.
Clik here to view.

Three Keys to Landing Your Dream DFIR Job

If you’re reading this blog, you know the truth: Digital Forensics & Incident Response (DFIR) is a great field! The work is fun, the challenges keep things interesting and the career outlook is...

View Article

Image may be NSFW.
Clik here to view.

The Unit

The open secret of successful, focused national security and infrastrucure within Israel, and the companies created by the Unit's veterans.    

View Article

Image may be NSFW.
Clik here to view.

French Version of Veracode “Free Wi-Fi” Infographic

document.write(unescape("%3Ciframe src='http://www.facebook.com/plugins/like.php?href=" + document.URL +...

View Article


Image may be NSFW.
Clik here to view.

Nitrozac and Snaggy: Bradbury, Tribute

via the comic genius of Nitrozac and Snaggy at The Joy of Tech™

View Article

Image may be NSFW.
Clik here to view.

Here’s Office 2013, on Windows 8 and RT! Today’s (belated) #ITBW for +...

Here's Office 2013, on Windows 8 and RT!Today's (belated) #ITBW for +Computerworld by +Richi Jennings...$MSFTHere's Office 2013, on Windows 8 and RT!

View Article

Image may be NSFW.
Clik here to view.

Hacking and securing the iPhone, iPad and iPod Touch: iOS features

Diana Kelley (Partner, SecurityCurve) gives a presentation at InfoSec World Conference to outline the background of the iOS and speak on security of iOS devices Hello and welcome! I’ll talk a little...

View Article


Image may be NSFW.
Clik here to view.

‘State-sponsored attackers’ using IE zero-day to hijack GMail accounts

Microsoft’s advisory speaks of “active attacks” and follows a separate note from Google that references the IE flaw “being actively exploited in the wild for targeted attacks.”

View Article


Image may be NSFW.
Clik here to view.

US-CERT warns of guest-to-host VM escape vulnerability

The vulnerability affects 64-bit operating systems and virtualization software running on Intel CPU hardware.

View Article

Image may be NSFW.
Clik here to view.

SBN Sponsor Post

June Webcast: register now for our upcoming webcast, “Future State of IT Security: A Survey of IT Security Executives” at 2pm EST June 27th.http://bit.ly/KPwOUF

View Article

Image may be NSFW.
Clik here to view.

WordPress 3.4 Released – Update, Update, Update

It’s always very easy to say to update, but the harsh reality is that although the update process has been drastically streamlined over the past few years, there are always a few challenges. Its why we...

View Article

Image may be NSFW.
Clik here to view.

Beware the phony Classmates.com email

Classmates.com has become the latest in a series of well-known brands to be abused by a particular gang of malware distributors.  The similarities to other outbreaks include: Linking to multiple...

View Article


Image may be NSFW.
Clik here to view.

What Every CIO Should Know about Cloud Computing

At the “What Every CIO Should Know About Cloud Computing” panel at FIRE X, we talked about how today’s IaaS momentum will shift to PaaS in coming years;  we also discussed the enterprise shift to...

View Article

Image may be NSFW.
Clik here to view.

VIDEO: How to solve the AusCERT 2012 #sophospuzzle

By popular demand, here is a video explaining how to solve the puzzle we published on our AusCERT 2012 conference T-shirt. 44 solvers from 14 countries cracked it in the time allowed - find out how...

View Article


Image may be NSFW.
Clik here to view.

Back Doors in US Infrastructure

According to this, Chinese equipment makers have built backdoors into their hardware (which may be the root of Mr. Panetta's remarks). First, a little perspective: Most intelligent networking...

View Article

Image may be NSFW.
Clik here to view.

Should patient consent be considered in sharing health info across national...

The steady migration to electronic health records, mandated by the HITECH Act, may lead to inevitable trade-offs between privacy and security on the one hand, and more efficient and, ultimately,...

View Article


Image may be NSFW.
Clik here to view.

SummerCon 2012 Wrap Up

This past weekend in downtown Brooklyn New York, a few miles away from the new Nets stadium was SummerCon 2012. SummerCon has the title of being the longest-running American hacker conference where...

View Article

Image may be NSFW.
Clik here to view.

Seen Ad Pop-up’s in Your Mobile Browser Lately?

by Armando Orozco Today, one of our Webroot SecureAnywhere for Android users reported seeing ad redirections while browsing on his Android device. As we began investigating, we noticed that there were...

View Article

Image may be NSFW.
Clik here to view.

Gartner Security & Risk Mgt- Day 3, Bigger and Badder than ever.

CipherBlonde is really enjoyed Day 3 @ the Gartner’s IT Security and Risk Management Summit: John Hodgman’s talk was hilarious, and he can sing He signed his book, “All”, to me, as The Vanna White of...

View Article
Browsing all 37364 articles
Browse latest View live