vBulletin Websites Using VBSEO Being Infected with Malware
We are seeing a large number of vBulletin/vBSEO websites getting compromised lately and we keep getting requests for info as to what’s going on. This is the type of malware being added to the hacked...
View ArticleReputation Vs. Reality on Android Security
Android has developed a reputation for being a very insecure mobile platform, ripe for malware infection. Galen Gruman of InfoWorld went so far as to call Android a “malware cesspool”. Is this...
View ArticleEnsygnia Introduces On-Demand End-Point Security
Appointed first global master distributor for Azuan Technologies New offer supports patented QR Code authentication process
View ArticlenCircle Announces PureCloud Enterprise
Scanning solution helps enterprises address common gaps in security visibility
View ArticleLast Week to Participate! Attack Mitigation Black Belt Final Round Begins Today.
If you’ve been waiting, now’s the time to participate – the last week of Radware’s Attack Mitigation Black Belt Challenge begins today and ends this week. And what a challenge it is! More and more...
View ArticleOsterman Research Survey Finds Mobile Device Management Costs Are Soaring
Among organizations that have not yet deployed an MDM solution, 32% will deploy one in 2013
View ArticleAzaleos Secures BYOD With New Cloud-based Mobile Device Management Service
Azaleos Managed Mobile Device Management Service enables enterprises to centrally secure and control all leading mobile devices
View ArticleCyber solutions: technology or finance?
By Professor Michael Mainelli, Executive Chairman, Z/Yen Group Limited In January 2011 over €45 million was stolen from the carbon markets in several ‘cyber crime’ incidents. Carbon markets were closed...
View ArticleHoneytokens being used in real world
Very interesting case of honeytokens deployment in this Network World article today. Here's what they did:Here's what happened. We use Salesforce.com as the single repository for information about...
View ArticleNot the most common password
Oddly, "swordfish" wasn't listed in Imperva's analysis of the millions of passwords leaked in the rockyou breach. It wasn't even in the top 100.
View ArticleElements of Next-Generation IPS – Context Awareness
In our previous two posts we covered application awareness and full-stack visibility, as well as an agile engine, as critical components of Next-Generation IPS (NGIPS). The next component of NGIPS is...
View ArticleSummer Of Breach 2012
It appears that we are well on our way to the “Summer of Breach 2012″ as site after site falls and password hashes leak out all over the tubes of the internet. In a bid to keep track I decided to put...
View ArticleInterview with Trey Ford – Black Hat 2012
If you’re a security professional, it’s very likely that you or folks you know are putting their last minute travel arrangements in place to go to Black Hat, the premier information security event...
View ArticleCompetitive Data Theft Lawsuit
We're seeing this more and more: Missouri-based Pulaski Bank has filed a lawsuit against rival First State Bank and three former employees alleging the theft of customer information, loan files and...
View ArticleIf a Security Control Falls in the Forest..
Many guidelines and compliance standards state that in order to be "secure" or "compliant" all of your systems must be patched. Turns out that this is easier said than done. Just when you believe your...
View ArticleWhere You Want to Be This Week for 07-09-2012
Where do you want to be this week? Now you’ll always know with our “Where You Want to Be This Week” feature, which will tell you about infosec meetups happening in your local area as of Sunday night....
View ArticleHow to Fake Monitoring
You’re the new guy in the security ops team, they’re giving you training and put you on a very crucial and important job… Monitoring. You’ll be told how important the job is and how it is essential to...
View ArticleWhat is your employers BYOD position?
I’m formulating a paper on this subject and I would like to hear your experiences. Let me know how Bring Your Own Device works – or doesn’t – at your place of employment. Take Our Poll
View ArticleThe Keyzer Söze of Survelliance
The inimitable Chris Soghoian, a fellow of the Open Society Foundations, describing the entity known as Neustar, in a posting at BuzzFeed. Today's MustRead in surveillance screedage. Ƣ
View ArticleHeading out to the Cloud Identity Summit
The summer conference season has begun, and for those of us living in Phoenix, going to conferences is a great way to get out July’s blast furnace heat. I’m heading out tomorrow to the Cloud Identity...
View Article