Security Development Conference 2012 – Wrap Up
Posted by: Tim Rains, Director, Trustworthy Computing Over the past few weeks, I have provided a recap of the Security Development Conference 2012 in a series of articles. These articles include video...
View ArticleAV or no AV
Last week Brian Krebs published an excellent blog post that shows how badly antivirus solutions fare against modern e-mail based threats. The research was conducted by a team at UAB, which focused on...
View Article“Internet Doomsday” for some, Get rid of DNSChanger Malware Now!
July 9, 2012, has been dubbed "Internet doomsday" and there is a chance you will not be able to access the Internet on your personal computer due to a malware called DNSChanger Trojan.
View ArticleA Look at June’s State of Cyber Security
May was an action-packed month and I’m happy to report that with the onset of summer, the truly severe threats seem to have subsided (for now). That’s not to say this month was without incident –...
View ArticlePress Release: SecureITExperts Launched
1 July 2012 FOR IMMEDIATE RELEASE: SecureITExpert Brad Bemis Launches New Security Startup Last week it was announced that SecureITExpert Brad Bemis would be stepping down from his role at Network...
View ArticleSBN Sponsor Post
June Webcast: register now for our upcoming webcast, “Future State of IT Security: A Survey of IT Security Executives” at 2pm EST June 27th.http://bit.ly/KPwOUF
View ArticleRebroadcast of 60 Minutes Stuxnet Piece
We found out about this piece 60 Minutes did on Stuxnet late last night … unfortunately after it had already broadcast. This morning @digitalbond pointed us to the 15 minute video on CBS’s website and...
View ArticleJuly 2012 Free Giveaway Sponsor – Hacking Dojo
Win a Year at the Hacking Dojo x2 Worth $2600!! Hacking Dojo (http://hackingdojo.com/) provides students with a long-term training and support system, with readily-available access to instructors....
View ArticleAmazing weight loss spam attack hits Twitter users [VIDEO]
Has your Twitter account been spewing out messages about an amazing weight loss product?
View ArticleMarcus Sachs Interview – Episode 294
Marcus Sachs Interview: Episode 294 Show Notes Episode 294 Part 1 (mp3) Episode 294 Part 2 (mp3) Tune in to PaulDotCom Security Weekly TV, Hack Naked TV, and Hack Naked At Night episodes on our YouTube...
View ArticleDrunken Security News #294
Can you stop a targeted attack? CVSS for penetration testers? Gartner, really? Episode 294 Show Notes Episode 294 Part 1 (mp3) Episode 294 Part 2 (mp3) Tune in to PaulDotCom Security Weekly TV, Hack...
View ArticleJeff McJunkin on Kon-Boot Over PXE
Fun tech segment on how to setup your systems to use PXE and boot Kon-Boot over the network to give you admin access to machines: Episode 294 Show Notes Episode 294 Part 1 (mp3) Episode 294 Part 2...
View ArticleBrute-Forcing WordPress Password Hashes with Hashcat on Backtrack 5
Quick tip on how to easily brute-force a password when users are using really lame passwords: Episode 294 Show Notes Episode 294 Part 1 (mp3) Episode 294 Part 2 (mp3) Tune in to PaulDotCom Security...
View ArticleFirst round of speakers selected for DerbyCon 2.0!
The first round of speakers have been selected for DerbyCon 2.0. For those that have submitted, we are only up to submissions sent up to May 23rd. If you did not receive an email, note that there are...
View ArticleTwitter Weekly Updates for 2012-07-02
Futurist – now theres a job title I would like. Wonder if there are different grades dependent on how far forwards you can predict ? # for example today I predict that there will be breakfast followed...
View ArticleBTOGG – Google Glass and Future Security Implications
While working on some other things yesterday, I had the live feed from Google I/O running. I have to say that Google is catching up and possibly surpassing Apple in coolness. They certainly took many...
View ArticleArticle for Infosecurity Magazine…
…my first for a while (where is old Mac when you need him?) Anyway, a response of sorts to an article by Kelly Jackson Higgins for Dark Reading on whether Apple is more security conscious these days....
View ArticleStolen Laptop Recovery via OSX Trap Partition
My Macbook Air has 2 partitions, one that is my normal everyday partition that is encrypted with FileVault2, and a 2nd partition that has Prey http://preyproject.com/ installed and ready to set my Mac...
View ArticleWham Bam, the Cutwail/Blackhole Combo
Over the past few weeks we have seen a resurgence of malicious spam with links leading off to the Blackhole exploit kit. Last week about 2% of spam hitting our traps fell into this category, which is...
View ArticleApex Secure Coding Considerations
Apex is an on-demand language that extends the Force.com platform by providing the ability to write applications that run on salesforce.com servers. Unlike other general-purpose languages such as C# or...
View Article