Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Revisiting mHealth with Dr. Ruchi Dass, Part 1

In 2010, we spoke with Dr. Ruchi Dass,  on mobile health trends. We touched base with her again to find out, nearly two years later, what’s changed – and what’s on the horizon. VPN Haus: We last spoke...

View Article


Image may be NSFW.
Clik here to view.

Illustratitive

Ɣ

View Article


Image may be NSFW.
Clik here to view.

Microsoft Office 2013 (aka 15) beta release date ‘today’ . Today’s #ITBW  for...

Microsoft Office 2013 (aka 15) beta release date 'today'.Today's #ITBW  for +Computerworld by +Richi Jennings $MSFT  #officepreview  Microsoft Office 2013 (aka 15) beta release date 'today'

View Article

Image may be NSFW.
Clik here to view.

Click for me, thanks!

Social sites are great for people who want monetize theirs ideas. But sometimes these ideas are far more sinister. Over the last few last weeks,  researchers at the Avast antivirus labs in Prague have...

View Article

Image may be NSFW.
Clik here to view.

The 7 Qualities of Highly Secure Software

One of the memorable quotes from the movie Bull Durham was: "This is a very simple game. You throw the ball, you catch the ball, and you hit the ball."  Application development security is like...

View Article


Image may be NSFW.
Clik here to view.

Information? …It’s Gonna Cost Ya

It has nothing to do with the size of your inbox or shared drive or whether your competitive edge stems from a specific design blueprint or a secret ingredient.  It could be that you have and need to...

View Article

Image may be NSFW.
Clik here to view.

Bsides London Video Awards

The most prestigious awards in all of information security are here, the Bsides London Video Awards! Check out all the talks at youtube.com/SecurityBsidesLondon

View Article

Image may be NSFW.
Clik here to view.

Angry hacker threatened ISP.. with an axe

A 29-year-old man has admitted hacking into an ISP's servers and deleting data belonging to the business, after he threatened to burn down its offices and menaced a company director with an axe. Temper...

View Article


Image may be NSFW.
Clik here to view.

How Facebook catches would-be child molesters by analyzing relationships and...

Law enforcement is hailing Facebook for using its little-known data monitoring technology to spot a suspicious conversation about sex between a man in his early thirties and a 13-year-old girl from...

View Article


Image may be NSFW.
Clik here to view.

Is BDUK a triumph or a disaster – and for whom?

Last week I was told that BDUK was a triumph because it had enabled the leveraging of a £billion of additional funding (from BT, EU and Local Authorities) on top of the DCMS funding. Three days later...

View Article

Image may be NSFW.
Clik here to view.

Agile Principle No. 3: Deliver Software Frequently, in Sprints . #HPIO UK for...

Agile Principle No. 3: Deliver Software Frequently, in Sprints. #HPIO UK for +HPUK by +Elizabeth Thomas... Agile Principle No. 3: Deliver Software Frequently... - Input Output

View Article

Image may be NSFW.
Clik here to view.

New trojan variant in emails from Deutsche Post regarding a parcel delivery...

MX Lab, http://www.mxlab.eu, started to intercept a new trojan distribution campaign by email with the subject “Deutsche Post.Holen Sie ihre Postsendung ab”. The email is send from the spoofed address...

View Article

Image may be NSFW.
Clik here to view.

eForensics Magazine | Free Digital Forensics Magazine

eForensics Magazine is a downloadable magazine focused on digital forensics. It features articles by digital forensics specialists and enthusiasts, experts in Mobile, Computer, Network and Database...

View Article


Image may be NSFW.
Clik here to view.

RSA Conference 2013 – Call for Speakers is Open!

RSA Conference Europe 2012 notifications will be going out next week. And now it's time to think about RSA Conference 2013, February 25 - March 1, 2013. Call for Speakers is now open for RSA Conference...

View Article

Image may be NSFW.
Clik here to view.

What did the Java applet say to the SWF? Don’t leave me alone in this...

Last week as we were analyzing the new version of Blackhole with the new Java exploit (CVE-2012-1723), we ran into a SWF file called Flash.swf that we've not analyzed before.  This is a refreshing...

View Article


Image may be NSFW.
Clik here to view.

Exploring The Edge Of Identity At The Cloud Identity Summit

It's Cloud Identity Summit week, and it should be a blast. For one, it's in beautiful Vail, CO - a place I've never been to. Secondly, you never know what will happen when you put all the identity...

View Article

Image may be NSFW.
Clik here to view.

Bruce Schneier: New Threats to the Internet Infrastructure 3. The Cyber War...

Bruce Schneier speaks here on the concept of cyber warfare, the way it might impact the world, and explains why cyber war rhetoric is destabilizing. Threat 3: The cyber war arms race The third threat I...

View Article


Image may be NSFW.
Clik here to view.

Week 28 in Review – 2012

Event RelatedS16 Networks: Presentations – si6networks.com The complete list of our presentations is available here.ResourcesLow Hanging Fruit – averagesecurityguy.info I decided to write a Python...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Windows Shell Command Injection – MS12-048 (CVE-2012-0175)

CVE-2012-0175 Background Windows File Association allows an application to define a handler that should be called for each operation on a specific file type. For example, WinRAR registers the file type...

View Article

Image may be NSFW.
Clik here to view.

Consumerist Website Was Breached

It appears that the popular Consumerist website was breached over the weekend. From Consumerist: Last night, we detected a new problem and took the site down for another five hours in order to address...

View Article
Browsing all 37364 articles
Browse latest View live