Revisiting mHealth with Dr. Ruchi Dass, Part 1
In 2010, we spoke with Dr. Ruchi Dass, on mobile health trends. We touched base with her again to find out, nearly two years later, what’s changed – and what’s on the horizon. VPN Haus: We last spoke...
View ArticleMicrosoft Office 2013 (aka 15) beta release date ‘today’ . Today’s #ITBW for...
Microsoft Office 2013 (aka 15) beta release date 'today'.Today's #ITBW for +Computerworld by +Richi Jennings $MSFT #officepreview Microsoft Office 2013 (aka 15) beta release date 'today'
View ArticleClick for me, thanks!
Social sites are great for people who want monetize theirs ideas. But sometimes these ideas are far more sinister. Over the last few last weeks, researchers at the Avast antivirus labs in Prague have...
View ArticleThe 7 Qualities of Highly Secure Software
One of the memorable quotes from the movie Bull Durham was: "This is a very simple game. You throw the ball, you catch the ball, and you hit the ball." Application development security is like...
View ArticleInformation? …It’s Gonna Cost Ya
It has nothing to do with the size of your inbox or shared drive or whether your competitive edge stems from a specific design blueprint or a secret ingredient. It could be that you have and need to...
View ArticleBsides London Video Awards
The most prestigious awards in all of information security are here, the Bsides London Video Awards! Check out all the talks at youtube.com/SecurityBsidesLondon
View ArticleAngry hacker threatened ISP.. with an axe
A 29-year-old man has admitted hacking into an ISP's servers and deleting data belonging to the business, after he threatened to burn down its offices and menaced a company director with an axe. Temper...
View ArticleHow Facebook catches would-be child molesters by analyzing relationships and...
Law enforcement is hailing Facebook for using its little-known data monitoring technology to spot a suspicious conversation about sex between a man in his early thirties and a 13-year-old girl from...
View ArticleIs BDUK a triumph or a disaster – and for whom?
Last week I was told that BDUK was a triumph because it had enabled the leveraging of a £billion of additional funding (from BT, EU and Local Authorities) on top of the DCMS funding. Three days later...
View ArticleAgile Principle No. 3: Deliver Software Frequently, in Sprints . #HPIO UK for...
Agile Principle No. 3: Deliver Software Frequently, in Sprints. #HPIO UK for +HPUK by +Elizabeth Thomas... Agile Principle No. 3: Deliver Software Frequently... - Input Output
View ArticleNew trojan variant in emails from Deutsche Post regarding a parcel delivery...
MX Lab, http://www.mxlab.eu, started to intercept a new trojan distribution campaign by email with the subject “Deutsche Post.Holen Sie ihre Postsendung ab”. The email is send from the spoofed address...
View ArticleeForensics Magazine | Free Digital Forensics Magazine
eForensics Magazine is a downloadable magazine focused on digital forensics. It features articles by digital forensics specialists and enthusiasts, experts in Mobile, Computer, Network and Database...
View ArticleRSA Conference 2013 – Call for Speakers is Open!
RSA Conference Europe 2012 notifications will be going out next week. And now it's time to think about RSA Conference 2013, February 25 - March 1, 2013. Call for Speakers is now open for RSA Conference...
View ArticleWhat did the Java applet say to the SWF? Don’t leave me alone in this...
Last week as we were analyzing the new version of Blackhole with the new Java exploit (CVE-2012-1723), we ran into a SWF file called Flash.swf that we've not analyzed before. This is a refreshing...
View ArticleExploring The Edge Of Identity At The Cloud Identity Summit
It's Cloud Identity Summit week, and it should be a blast. For one, it's in beautiful Vail, CO - a place I've never been to. Secondly, you never know what will happen when you put all the identity...
View ArticleBruce Schneier: New Threats to the Internet Infrastructure 3. The Cyber War...
Bruce Schneier speaks here on the concept of cyber warfare, the way it might impact the world, and explains why cyber war rhetoric is destabilizing. Threat 3: The cyber war arms race The third threat I...
View ArticleWeek 28 in Review – 2012
Event RelatedS16 Networks: Presentations – si6networks.com The complete list of our presentations is available here.ResourcesLow Hanging Fruit – averagesecurityguy.info I decided to write a Python...
View ArticleMicrosoft Windows Shell Command Injection – MS12-048 (CVE-2012-0175)
CVE-2012-0175 Background Windows File Association allows an application to define a handler that should be called for each operation on a specific file type. For example, WinRAR registers the file type...
View ArticleConsumerist Website Was Breached
It appears that the popular Consumerist website was breached over the weekend. From Consumerist: Last night, we detected a new problem and took the site down for another five hours in order to address...
View Article