Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Week 26 in Review – 2012

Event Related Workshop on the Economics of Information Security 2012 – lightbluetouchpaper.org I’m liveblogging WEIS 2012, as I did in 2011, 2010 and 2009. The event is being held today and tomorrow at...

View Article


Image may be NSFW.
Clik here to view.

Treadstone 71 and Utica College – Cyber Intelligence and Open Source

As an adjunct instructor of cyber intelligence (CYB610) and counterintelligence (CYB615) at Utica College, students use live exercises to supplement the academic readings and theories. Recently, the...

View Article


Image may be NSFW.
Clik here to view.

Cyberciminals launch managed SMS flooding services

By Dancho Danchev Mobile devices are an inseparable part of the modern cybercrime ecosystem. From ATM skimmers with SMS notification next to fake antivirus scanners for Android users, the growth of the...

View Article

Image may be NSFW.
Clik here to view.

Job: Penetration Tester in Washington, DC

SecureState seems to be looking for a pen tester to perform ongoing services for a number of systems based on their status within C&A cycle, ATO status, and estimated risk. From what they are...

View Article

Image may be NSFW.
Clik here to view.

HURRY! CITADEL IS GOING OFF THE OPEN MARKET!

Citadel – Yesterday and Today Citadel started as a Zeus v2 Trojan, deployed and tweaked by a crime gang using it for their own banking fraud operations, however once Citadel was released into the...

View Article


Image may be NSFW.
Clik here to view.

Are you ready for your Green Belt in Attack Mitigation?

Knowledge Test Overview Wow! The Attack Mitigation Black Belt Challenge is only two weeks old and already we have dueling leaders and intense competition. People from all over the world are...

View Article

Image may be NSFW.
Clik here to view.

Do not miss the warning signs – be prepared

It’s not just the Ukrainians and the Polish that are seeing a surge in demand as the Euro Championships take place. Here at Symantec, we have noticed some curious spikes in data usage, around the time...

View Article

Image may be NSFW.
Clik here to view.

A math joke (sort of)

What book by Hemingway is this? (2)(1/2) + (1/2)(0)

View Article


Image may be NSFW.
Clik here to view.

Despite New SEC Rule, Organizations Rarely Disclose Cyber Breaches

Hackers broke into computers at hotel giant Wyndham Worldwide Corp. three times in two years and stole credit card information belonging to hundreds of thousands of customers. Wyndham didn’t report...

View Article


Image may be NSFW.
Clik here to view.

Why You Need to Protect Your Application Layer

document.write(unescape("%3Ciframe src='http://www.facebook.com/plugins/like.php?href=" + document.URL +...

View Article

Image may be NSFW.
Clik here to view.

Trust Matters Series issue 2

Risk matters…so does trust By Bryan K. Fite, BT Assure US & C Portfolio Manager Many organisations do not manage risk in a holistic way. Rather, they maintain silos of risk-management activity that...

View Article

Image may be NSFW.
Clik here to view.

SSD price crash: 80¢ per GB! #HPIO for + Esther Schindler  by + Richi...

SSD price crash: 80¢ per GB! #HPIO for +Esther Schindler by +Richi Jennings...SSD price crash: 80¢ per GB! - Input Output

View Article

Image may be NSFW.
Clik here to view.

Eurotrash MicroTRASH 29 – Mark Hillick talks GSE

Eurotrash MicroTRASH 29 - Mark Hillick talks GSE

View Article


Image may be NSFW.
Clik here to view.

Intrusion Prevention System: First Line of Defense

In the past few years, advancements in technology have grown hand in hand with a substantial increase in hacking and cyber espionage. The whole world is deeply interconnected through the medium of......

View Article

Image may be NSFW.
Clik here to view.

Social Engineering – We Start Playing

If hacking is known as entering a computer system through a breach of security, social engineering can be referred to as an intrusion into the mind. That really is the basic meaning of social... Go on...

View Article


Image may be NSFW.
Clik here to view.

Think Differently

For too long the information, security industry has looked at information homogenously and assumed that all hacking is created equally because all information is created equal. This could not be...

View Article

Image may be NSFW.
Clik here to view.

The LinkedIn – Dickensonian Reciprocity

Well crafted tale, worthy of Charles John Huffam Dickens, detailing the fascinating connection between the LinkedIn password fiasco and Charles Dickens. Highly Pickwickian. Ð

View Article


Image may be NSFW.
Clik here to view.

All Carberp botnet organizers arrested

We have already been tracking the Carberp cybercrime group’s activity for three years. Tracking started in 2009 with the first samples seen in the wild. The second wave of Carberp activity had forced...

View Article

Image may be NSFW.
Clik here to view.

Nitrozac and Snaggy: Venus of Willendorf

via the comic genius of Nitrozac and Snaggy at The Joy of Tech™

View Article

Image may be NSFW.
Clik here to view.

Upcoming SANS Training Events

SecurityOrb.com offers a $150.00 discount on SANS training to our readers. Simply register for any SANS course using the following discount code: SecOrb_Connect ($150 off any SANS course in any format)

View Article
Browsing all 37364 articles
Browse latest View live