Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

vBulletin Websites Using VBSEO Being Infected with Malware

We are seeing a large number of vBulletin/vBSEO websites getting compromised lately and we keep getting requests for info as to what’s going on. This is the type of malware being added to the hacked...

View Article


Image may be NSFW.
Clik here to view.

Reputation Vs. Reality on Android Security

Android has developed a reputation for being a very insecure mobile platform, ripe for malware infection. Galen Gruman of InfoWorld went so far as to call Android a “malware cesspool”. Is this...

View Article


Image may be NSFW.
Clik here to view.

Ensygnia Introduces On-Demand End-Point Security

Appointed first global master distributor for Azuan Technologies New offer supports patented QR Code authentication process

View Article

Image may be NSFW.
Clik here to view.

nCircle Announces PureCloud Enterprise

Scanning solution helps enterprises address common gaps in security visibility

View Article

Image may be NSFW.
Clik here to view.

Last Week to Participate! Attack Mitigation Black Belt Final Round Begins Today.

If you’ve been waiting, now’s the time to participate – the last week of Radware’s Attack Mitigation Black Belt Challenge begins today and ends this week. And what a challenge it is! More and more...

View Article


Image may be NSFW.
Clik here to view.

Osterman Research Survey Finds Mobile Device Management Costs Are Soaring

Among organizations that have not yet deployed an MDM solution, 32% will deploy one in 2013

View Article

Image may be NSFW.
Clik here to view.

Azaleos Secures BYOD With New Cloud-based Mobile Device Management Service

Azaleos Managed Mobile Device Management Service enables enterprises to centrally secure and control all leading mobile devices

View Article

Image may be NSFW.
Clik here to view.

Cyber solutions: technology or finance?

By Professor Michael Mainelli, Executive Chairman, Z/Yen Group Limited In January 2011 over €45 million was stolen from the carbon markets in several ‘cyber crime’ incidents. Carbon markets were closed...

View Article


Image may be NSFW.
Clik here to view.

Honeytokens being used in real world

Very interesting case of honeytokens deployment in  this Network World article today. Here's what they did:Here's what happened. We use Salesforce.com as the single repository for information about...

View Article


Image may be NSFW.
Clik here to view.

Not the most common password

Oddly, "swordfish" wasn't listed in Imperva's analysis of the millions of passwords leaked in the rockyou breach. It wasn't even in the top 100. 

View Article

Image may be NSFW.
Clik here to view.

Elements of Next-Generation IPS – Context Awareness

In our previous two posts we covered application awareness and full-stack visibility, as well as an agile engine, as critical components of Next-Generation IPS (NGIPS). The next component of NGIPS is...

View Article

Image may be NSFW.
Clik here to view.

Summer Of Breach 2012

It appears that we are well on our way to the “Summer of Breach 2012″ as site after site falls and password hashes leak out all over the tubes of the internet. In a bid to keep track I decided to put...

View Article

Image may be NSFW.
Clik here to view.

Interview with Trey Ford – Black Hat 2012

If you’re a security professional, it’s very likely that you or folks you know are putting their last minute travel arrangements in place to go to Black Hat, the premier information security event...

View Article


Image may be NSFW.
Clik here to view.

Competitive Data Theft Lawsuit

We're seeing this more and more: Missouri-based Pulaski Bank has filed a lawsuit against rival First State Bank and three former employees alleging the theft of customer information, loan files and...

View Article

Image may be NSFW.
Clik here to view.

If a Security Control Falls in the Forest..

Many guidelines and compliance standards state that in order to be "secure" or "compliant" all of your systems must be patched. Turns out that this is easier said than done. Just when you believe your...

View Article


Image may be NSFW.
Clik here to view.

Where You Want to Be This Week for 07-09-2012

Where do you want to be this week? Now you’ll always know with our “Where You Want to Be This Week” feature, which will tell you about infosec meetups happening in your local area as of Sunday night....

View Article

Image may be NSFW.
Clik here to view.

How to Fake Monitoring

You’re the new guy in the security ops team, they’re giving you training and put you on a very crucial and important job… Monitoring. You’ll be told how important the job is and how it is essential to...

View Article


Image may be NSFW.
Clik here to view.

What is your employers BYOD position?

I’m formulating a paper on this subject and I would like to hear your experiences. Let me know how Bring Your Own Device works – or doesn’t – at your place of employment. Take Our Poll

View Article

Image may be NSFW.
Clik here to view.

The Keyzer Söze of Survelliance

The inimitable Chris Soghoian, a fellow of the Open Society Foundations, describing the entity known as Neustar, in a posting at BuzzFeed. Today's MustRead in surveillance screedage. Ƣ

View Article

Image may be NSFW.
Clik here to view.

Heading out to the Cloud Identity Summit

The summer conference season has begun, and for those of us living in Phoenix, going to conferences is a great way to get out July’s blast furnace heat. I’m heading out tomorrow to the Cloud Identity...

View Article
Browsing all 37364 articles
Browse latest View live