Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Today I Learned that medical practice is "tyrannical, hierarchical,...

Today I Learned that medical practice is "tyrannical, hierarchical, controlled, intolerant, dogmatic"Spence D. What happened to the doctor-patient relationship? BMJ 2012;344:e4349TIL medical practice...

View Article


Image may be NSFW.
Clik here to view.

Pirating is bad but reselling digital work is OK, says EU ruling . #HPIO UK...

Pirating is bad but reselling digital work is OK, says EU ruling.#HPIO UK for +HPUK by +David Amerland... Pirating is bad but reselling digital work is OK, ... - Input Output

View Article


Image may be NSFW.
Clik here to view.

SBN Sponsor Post

RSA Conference Europe Keynote: Jimmy Wales of Wikipedia announced as keynote speaker.http://bit.ly/JfcoRI

View Article

Image may be NSFW.
Clik here to view.

Watch Sophos’s James Lyne audition for TED2013

Sophos's James Lyne recently auditioned to present at next year's main TED conference in Long Beach California: "The Young. The Wise. The Undiscovered." Take a look and see what you think. Watch his...

View Article

Image may be NSFW.
Clik here to view.

Court: Banks have some fraud liability — but security is still the SMB’s...

A federal appeals court ruling in favor of a small business whose bank failed to stop a series of transfers detected by its anti-fraud service opens the door a crack on just how badly a financial...

View Article


Image may be NSFW.
Clik here to view.

What’s up with Microsoft’s certificates?

It looks like Microsoft just revoked several of the certificates of their intermediate CAs. According to their announcement, they revoked the following 28 certificates: Microsoft Genuine Windows Phone...

View Article

Image may be NSFW.
Clik here to view.

Don’t Let Problems Stop You From Carrying Out Web Application Testing

Web security assessment success is directly related to the amount of preparation you do up front before you run a single web application test. It’s the 80/20 Rule: the 20 percent time and effort you...

View Article

Image may be NSFW.
Clik here to view.

Analysis of Yahoo Voice Password Leak – 453,441 Passwords exposed

We recently heard that a massive leak of Yahoo passwords have been floating on the interwebs for a few days. According to arstechnica the dump is from Yahoo Voice and the full data was released in...

View Article


Image may be NSFW.
Clik here to view.

Thank you! I just love the level of interaction here. I just wanted to...

Thank you!I just love the level of interaction here.I just wanted to recognize all you wonderful people who comment, share, and +1 my posts. You make it all worthwhile; thanks!

View Article


Image may be NSFW.
Clik here to view.

Infographic – Blended attacks in Q2 2012

View Article

Image may be NSFW.
Clik here to view.

Parents – The Information Guardians

Parents – The Information Guardians By: Ian Gillespie I’ve had this particular issue stuck in my head for a while. The recent article by Steve McMaster discussing how we agreed to Facebook’s policies...

View Article

Image may be NSFW.
Clik here to view.

Agile Methodology—How Does it Bite?

This article will provide readers with an introduction to the statistical and dynamic analysis of code. However, before proceeding to analysis, we must first understand the concept of agile... Go on to...

View Article

Image may be NSFW.
Clik here to view.

By the Numbers: US Healthcare Data Breaches

The last time we looked at healthcare data breaches was a couple of years ago, so I thought maybe we should take another look. A listing of breaches of unsecured protected health information (PHI)...

View Article


Image may be NSFW.
Clik here to view.

Semantics and Compliance

I was sitting in a meeting earlier this year and someone me asked a “quick” question about PCI DSS. Always happy to oblige, I listened to the person go through a very intricate discussion and setup for...

View Article

Image may be NSFW.
Clik here to view.

M-Unition Podcast: Ryan Kazanciyan Discusses Incident Response Class at Black...

In our latest M-Unition Podcast, Mandiant’s Kristen Cooper sat down with Ryan Kazanciyan, principal consultant, to discuss a course he and his colleagues will be teaching at Black Hat USA: Incident...

View Article


Image may be NSFW.
Clik here to view.

How The Yahoo Voices Breach Went Down

Yahoo! Voices was breached. This application is an online publishing application that was developed by Associated Content and later acquired by Yahoo!. It allows consumers to share information on any...

View Article

Image may be NSFW.
Clik here to view.

Take Time to Opine

Another few weeks has passed and it’s time for another post.  It’s difficult keeping up around here – there’s always so much going on.  What’s hit the news wires over the past few weeks?  Anything...

View Article


Image may be NSFW.
Clik here to view.

TOR, Surveilled

Another well crafted screed from the inimitable John Leyden of El Reg - this time detailing the dust-up between and betwixt CyberRoam and the TOR project. Allegations of mass surveillance are rampant,...

View Article

Image may be NSFW.
Clik here to view.

Single Sign On with Windows Azure Active Directory: a Deep Dive

Are you excited about the Developer Preview of Windows Azure Active Directory? I sure am! In this post I am going to give a pretty deep look at the machinery that’s behind the Web Single Sign On...

View Article

Image may be NSFW.
Clik here to view.

Survival Thinking: How Much Is Enough?

I've come to 2 reinforced realizations: 1) the weather/climate is truly unhinged and dangerous 2) people are crazy. As such, it's occurred to me that it might be time to improve my planning for...

View Article
Browsing all 37364 articles
Browse latest View live