Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

There is no spoon.

I just read this article from TechTarget, quoting Gartner research vice president Ramon Krikken as saying:[...] it may be time to ask whether it’s faster, cheaper and ultimately just as effective to...

View Article


Image may be NSFW.
Clik here to view.

A Not to be Missed Event for the KVM Community

June 26th through June 29th the Red Hat community will be converging upon Boston for the Annual Red Hat Summit/ JBoss World. The event, held at the Hynes Convention Center, will be jam-packed with...

View Article


Image may be NSFW.
Clik here to view.

13 Security Tips To Combat Mobile Device Threats To Healthcare

Risks to patient data growing, as cited by Department of Homeland Security

View Article

Image may be NSFW.
Clik here to view.

Wurldtech Provides Schneider Electric With Achilles Lab Accreditation

Achilles Communication Certification provides security benchmark for embedded devices used in industrial infrastructure and other mission-critical connected devices

View Article

Image may be NSFW.
Clik here to view.

Voltage Security Extends End-To-End Email Encryption To iOS And Android Devices

Voltage SecureMail Mobile Edition allows mobile users to read encrypted messages sent from Voltage-enabled desktops, gateways, enterprise applications and other mobile devices

View Article


Image may be NSFW.
Clik here to view.

Redspin Pioneers Advanced Persistent Threat (APT) Assessment Service

New service uses multiple attack vectors and shared knowledge assessments

View Article

Image may be NSFW.
Clik here to view.

Check Point Survey Reveals A Generation Gap In Computer Security

More than three-quarters of Gen Y respondents do not follow security best practices

View Article

Image may be NSFW.
Clik here to view.

What We’re Reading, Week of 6/18

Computerworld- Remote access technologies in a BYOD era FierceTelecom- World IPv6 Launch results: What effect did the event have on the Internet? GigaOM- BYOD wave sparks big security concerns CNBC-...

View Article


Image may be NSFW.
Clik here to view.

CVSS for Penetration Test Results (Part I)

Trustwave has been adding support for the Common Vulnerability Scoring System (CVSS) in PenTest Manager, our online reporting portal used for all SpiderLabs penetration tests.  While this is a great...

View Article


Image may be NSFW.
Clik here to view.

Hack in Paris 2012 Wrap-Up Day #2

“Home sweet home!“, its time to wrap-up the second day of Hack in Paris before taking some sleep hours. The second day started with Winn Schwartau from securityexperts.com. His talk was called...

View Article

Image may be NSFW.
Clik here to view.

Dispelling The Myth: Bar of Security

For the last two years, I’ve observed the information security industry buzzing about the Advanced Persistent Threat (APT), highly sophisticated malware, and 0 day exploits. There are many reasons why...

View Article

Image may be NSFW.
Clik here to view.

Top 3 NoVA Infosec Blog Posts of the Week

It’s that time of the week again: the time where we take a look at what local security bloggers have been up to. You can take a look at what local security bloggers have been up to but if you can’t...

View Article

Image may be NSFW.
Clik here to view.

New job and other busy things

Yes, I’m a bit late and this isn’t much of a security video, but I guess I needed to explain where I’d been and seeing as Girl Cynic took some time out of her busy schedule to be available for some...

View Article


Image may be NSFW.
Clik here to view.

Beacon Podcast Episode 029

Hurricane Labs Beacon Podcast Episode Number: .029 – Holy Island Oracle Edition Hosts: Bill Mathews (@billford), Matt Yonchak (@mattyonchak), Patrick Sayler (@psayler), Tom Kopchak SECURITY LinkedIn...

View Article

Image may be NSFW.
Clik here to view.

‘Create a Cartoon of You” ads serving MyWebSearch toolbar

By Dancho Danchev On their way to attract new users, adware providers and online marketers often come up with new and creative ideas tailored to average Internet users. These often include free...

View Article


Image may be NSFW.
Clik here to view.

Why do Microsoft Researchers Say They are from Microsoft?

A few people have mentioned that my title on the prior post is causing confusion for those trying to find the original report. Allow me to try and provide a brief summary instead, as well as a link:...

View Article

Image may be NSFW.
Clik here to view.

How to Protect Your Gmail Account from Hackers

Hackers target online Email accounts for a reason, they know if they can 'own' a webmail account, they can access it from anywhere and at any time, to use it as a tool and to harvest information of...

View Article


Image may be NSFW.
Clik here to view.

US Senate proposes national data breach notification act

A new bill has been brought before the US Senate that would unify data breach notification laws across the United States. Read on for what's protected and how it would work.

View Article

Image may be NSFW.
Clik here to view.

CVE-2012-3586: Basho Riak API, Security Alert

On June 14th a comment on Github asked Basho about validation in their API The riak http api for map reduce doesn't check if the content-type is application/json. The javascript http api also lets the...

View Article

Image may be NSFW.
Clik here to view.

InfoSec Daily Podcast Episode 700

Episode 700 - VUPEN, Unwanted Printouts, Twitter Outage, AutoCAD Worm, Paycardreader

View Article
Browsing all 37364 articles
Browse latest View live