Law Enforcement Is Worried About IPv6
So. It appears that law enforcement is worried about IPv6 as it has noticed that things will be different with IPv6. They believe that this will make it easier for criminals to hide. I’m a little...
View ArticleInfoSec Daily Podcast Episode 699
Episode 699 - No Hacking Books, 278-digit Crypto Cracked, Win8: Hard To Kill, "state-sponsored" 0-day, Huawei
View ArticleKellep Charles Information Security Blog Space 2012-06-21 19:49:00
The Vulnerabilities Market and the Future of Security - Forbes
View ArticleBit9 Stopped Flame? Do Go On…
Today I received a marketing email from a company called Bit9 who has a product that provides white listing for Windows based computers. Now, typically I would peruse such email for a moment and then,...
View ArticleCanadian Pharmacy Spam Targets Euro 2012
Euro 2012 is in full swing, and so are spammers with the following missive currently landing in mailboxes: Click to enlarge The message reads: EURO 2012 LIVE: Czech Rep. 0 Portugal 1 WARSAW, Poland...
View ArticleScareware makes it way to mobile devices…
Well, I suppose it had to happen sooner or later http://krebsonsecurity.com/2012/06/beware-scare-tactics-for-mobile-security-apps/ Image source: krebsonsecurity
View ArticleTaking Control of the HRD Experience with the New WIF 4.5 Tools (with a...
One of the key differences between using claims-based identity for one enterprise app and an app meant to be used on the web has to do with which identity providers are used, and how. Of course there...
View ArticlePharmaLeaks: Rogue Pharmacy Economics 101
Consumer demand for cheap prescription drugs sold through spam-advertised Web sites shows no sign of abating, according to a new analysis of bookkeeping records maintained by three of the world’s...
View ArticleDiablo 3 Patch Limits Content for up to 72 Hours to “Combat Fraud”
It seems that Blizzard, creators of Diablo 3 have walked into a bit of a kerfuffle (technical term) in their bid to clamp down on credit card fraud, botting and auction house shenanigans: owners of the...
View ArticleNext Week at TechEd Europe: A Lap Around Windows Azure Active Directory
After long months spent in my dark PM-cave in Redmond, it’s finally conferences season again! Last week I had the pleasure of presenting WIF 4.5 at TechEd Orlando and meet many of you; this Saturday I...
View ArticleWould you run a Bug Bounty programme? Well? Given the chance, would you?...
Would you run a Bug Bounty programme?Well? Given the chance, would you? #HPIO UK Editor's blog for +HPUK for +Richi Jennings...Would you run a Bug Bounty programme? - Input Output
View ArticleThousands of office printers hit by "gibberish" malware
What’s been dubbed as a “paper salesman’s dream come true,” thousands of printers worldwide are spewing out garbled content as a result of a malware infection.
View ArticleFotos Malware Hunts for Banking Logins
We recently discovered a file sitting on Dropbox which turned out to be a very good way to give your PC a very bad hair day. The file is now inaccessible – the page gives the following message:...
View ArticleApple patents clone-making technology to sabotage electronic profiling
Apple has filed a patent for making clones of your online identity that will serve up misinformation to data collectors, thus polluting the data stream that feeds electronic profiling.
View ArticleNew Undergrad Infosec Honors Program at UMD
Although we usually don’t advise getting undergrad infosec degrees, some may want to take advantage of this new program by the University of Maryland (UMD). Ideally though, we’d prefer to see students...
View ArticleLinkedIn Breach Lawsuit: “Security Policy In Clear Contraction Of Accepted...
An Illinois woman has filed a $5 million lawsuit against LinkedIn Corp, saying the social network violated promises to consumers by not having better security in place when more than 6 million...
View ArticleWho is making the bigger cuts: Whitehall or its Outsource Suppliers?
A number of commentators seem to think that future cuts in the Civil Services will lead to an increase in outside business and influence . In other words they think the policy is nominal cuts with...
View ArticleMeta-comments on the Fujitsu discrete log calculation
There have been all sorts of totally inaccurate interpretations of the recent discrete log calculation that a team of Fujitsu researchers (and others) managed to do. The best summary of these comments...
View Article