Today I Learned that medical practice is "tyrannical, hierarchical,...
Today I Learned that medical practice is "tyrannical, hierarchical, controlled, intolerant, dogmatic"Spence D. What happened to the doctor-patient relationship? BMJ 2012;344:e4349TIL medical practice...
View ArticlePirating is bad but reselling digital work is OK, says EU ruling . #HPIO UK...
Pirating is bad but reselling digital work is OK, says EU ruling.#HPIO UK for +HPUK by +David Amerland... Pirating is bad but reselling digital work is OK, ... - Input Output
View ArticleSBN Sponsor Post
RSA Conference Europe Keynote: Jimmy Wales of Wikipedia announced as keynote speaker.http://bit.ly/JfcoRI
View ArticleWatch Sophos’s James Lyne audition for TED2013
Sophos's James Lyne recently auditioned to present at next year's main TED conference in Long Beach California: "The Young. The Wise. The Undiscovered." Take a look and see what you think. Watch his...
View ArticleCourt: Banks have some fraud liability — but security is still the SMB’s...
A federal appeals court ruling in favor of a small business whose bank failed to stop a series of transfers detected by its anti-fraud service opens the door a crack on just how badly a financial...
View ArticleWhat’s up with Microsoft’s certificates?
It looks like Microsoft just revoked several of the certificates of their intermediate CAs. According to their announcement, they revoked the following 28 certificates: Microsoft Genuine Windows Phone...
View ArticleDon’t Let Problems Stop You From Carrying Out Web Application Testing
Web security assessment success is directly related to the amount of preparation you do up front before you run a single web application test. It’s the 80/20 Rule: the 20 percent time and effort you...
View ArticleAnalysis of Yahoo Voice Password Leak – 453,441 Passwords exposed
We recently heard that a massive leak of Yahoo passwords have been floating on the interwebs for a few days. According to arstechnica the dump is from Yahoo Voice and the full data was released in...
View ArticleThank you! I just love the level of interaction here. I just wanted to...
Thank you!I just love the level of interaction here.I just wanted to recognize all you wonderful people who comment, share, and +1 my posts. You make it all worthwhile; thanks!
View ArticleParents – The Information Guardians
Parents – The Information Guardians By: Ian Gillespie I’ve had this particular issue stuck in my head for a while. The recent article by Steve McMaster discussing how we agreed to Facebook’s policies...
View ArticleAgile Methodology—How Does it Bite?
This article will provide readers with an introduction to the statistical and dynamic analysis of code. However, before proceeding to analysis, we must first understand the concept of agile... Go on to...
View ArticleBy the Numbers: US Healthcare Data Breaches
The last time we looked at healthcare data breaches was a couple of years ago, so I thought maybe we should take another look. A listing of breaches of unsecured protected health information (PHI)...
View ArticleSemantics and Compliance
I was sitting in a meeting earlier this year and someone me asked a “quick” question about PCI DSS. Always happy to oblige, I listened to the person go through a very intricate discussion and setup for...
View ArticleM-Unition Podcast: Ryan Kazanciyan Discusses Incident Response Class at Black...
In our latest M-Unition Podcast, Mandiant’s Kristen Cooper sat down with Ryan Kazanciyan, principal consultant, to discuss a course he and his colleagues will be teaching at Black Hat USA: Incident...
View ArticleHow The Yahoo Voices Breach Went Down
Yahoo! Voices was breached. This application is an online publishing application that was developed by Associated Content and later acquired by Yahoo!. It allows consumers to share information on any...
View ArticleTake Time to Opine
Another few weeks has passed and it’s time for another post. It’s difficult keeping up around here – there’s always so much going on. What’s hit the news wires over the past few weeks? Anything...
View ArticleTOR, Surveilled
Another well crafted screed from the inimitable John Leyden of El Reg - this time detailing the dust-up between and betwixt CyberRoam and the TOR project. Allegations of mass surveillance are rampant,...
View ArticleSingle Sign On with Windows Azure Active Directory: a Deep Dive
Are you excited about the Developer Preview of Windows Azure Active Directory? I sure am! In this post I am going to give a pretty deep look at the machinery that’s behind the Web Single Sign On...
View ArticleSurvival Thinking: How Much Is Enough?
I've come to 2 reinforced realizations: 1) the weather/climate is truly unhinged and dangerous 2) people are crazy. As such, it's occurred to me that it might be time to improve my planning for...
View Article