In memoriam – Alan Turing’s 100th birthday
Alan Turing is probably best known to the public for his cryptanalytical derring-do at Bletchley Park, UK, during the Second World War. But it is Turing's ever-present Halting Problem which teaches us...
View ArticleThe Importance of Cookie Recon
Commonplace with network or application assessments, nikto, dirb, and/or DirBuster are often used to scan web servers for common content in order to find interesting tidbits that disclose information...
View ArticleLiquidmatrix Security Digest Podcast – Episode 5
Episode 5 — Everybody’s Working For The Weekend (Canada Day Edition) Yes, you’re getting this before the weekend. Mostly because Sunday is Canada Day and 3/4 of us will be busy. Enjoy! The fun with...
View ArticleCISOs Share Essential Protection Tips To Help Businesses Safeguard Data
Who’s guiding your business’ information security program? In the wake of this month’s LinkedIn password breach, rumors began circulating on Twitter that the social network lacked a chief information...
View ArticleZero-day XML Core Services vulnerability included in Blackhole exploit kit
Shortly after our original advisory about the latest zero-day vulnerability in Microsoft XML Core Services (CVE-2012-1889), code to exploit the vulnerability was seen in a Blackhole exploit kit. The...
View ArticleWeekly News Roundup
document.write(unescape("%3Ciframe src='http://www.facebook.com/plugins/like.php?href=" + document.URL +...
View ArticlePII Carrion aka Spokeo
More on one what is most likely the most egrgious personal provacy violator (other than Facebook) on the Interwebs- Spokeo. Read and weep... ➑
View ArticleFrom SC Magazine: Roy Zisapel, Radware CEO, Says Flame-Like Vulnerabilities...
Yesterday, SC Magazine published an article by Radware’s president and CEO, Roy Zisapel, addressing the infamous Flame malware. Flame stole headlines over the past month, emerging as the most advanced...
View ArticleVideo Review: Cobalt Strike Penetration Testing Software
By Ryan Linn (content/category/7/40/24/) Cobalt Strike is the latest tool that Raphael Mudge (@Armitagehacker (https://twitter.com/armitagehacker)) has released at Armitage...
View ArticleMicrosoft XML Core Service Zero Day Vulnerability Being Targeted
On June 12th we reported the release of a new Microsoft Security Advisory. It was of specific interest to us as it was exploitable via web-based malware and being classified as a Zero Day...
View ArticleX.org evdev segfault
Aside from the emerging exposure issues in user display (e.g. physical or virtual graphics card using main memory) I'm noticing stack buffer overruns in X windows. Bug 973297 for X.org evdev describes...
View ArticleLiquidmatrix Security Digest Podcast – The Video Teaser Episode
We’ve been threatening to do something interesting and cool… We’re happy to announce that we will be producing a bi-weekly video podcast edition – tightly edited to a broadcast friendly 22 minutes in...
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticleLibor also broke the first rule of Information Governance
Until two days ago I was among those who believed that "Libor" was an authoritative index based on actual transactions, not unchecked estimates, collated once a day, from traders with a vested...
View ArticleYour E-Book Is Reading You
Your E-Book Is Reading You Very interesting piece from the Wall Street Journal examining how “Big Data” has come to the world of books: In the past, publishers and authors had no way of knowing what...
View ArticleReaders’ Poll – Remote Access Frustrations
To help better shape our content, we at VPN Haus would love to get to know you – and your interests — better. This week, we’d like to learn about what causes you frustration when working remotely. We...
View ArticleSlide Rules
I read this blog post on Slide Rules by Wendy Nather and immediately dropped her a note asking for permission to convert it into a video. After a huge battle with 20th Century Fox over rights to film I...
View ArticleRoadmap for a Roadmap
1999 was great for so many reasons. While I don’t try to party like it anymore, ’99 holds a special place in my professional ethos thanks to Mike Judge’s seminal work. If I type the name of the movie...
View ArticleFrom fear to feature – deploying code faster as a security feature?
Is the thought of deploying software multiple times per day making your security-focused brain freak out? What if I told you that there are security-minded people out there that think deployment at...
View Article