Grecs’ Weekend Best Bets for 2012-07-20
Here it is again … another of our weekly “Best Bets” posts… As we’ve previously noted most local meetups seem to be crowded into weekday evenings with almost nothing on the weekend. The purpose of...
View ArticleBlackHat WormHole
Apparently BlackHat has become so big it literally makes the last days of July disappear. It might be hard on the business expense report form but what happens in the hole stays in the hole. Here's an...
View ArticleSocial-Engineer.org is Vegas Bound Baby!
By Chris Hadnagy 20 years. Hard to believe, but Defcon has been around for 2 decades. And Black Hat has been doing its thing for 15 years and continues to buck the conference trend and grow in...
View ArticleOff Air -for now we will be back!
Miss our sexy voices? Our illogical logic? Our “geeky” rants? Our infinite wisdom? If you answered yes to any of these questions it is likely that you are missing our podcasts. Well without making...
View ArticleNorman Rolls Out New Version Of Malware Analyzer G2
Norman Malware Analyzer G2 provides Hybrid SandBoxing
View ArticleRackspace Cloud Security Tip #2
Create Rackspace Security Groups In our last post on securing Rackspace cloud servers, we talked about closing service ports like RDP and SSH to ward off hackers and enable secure, remote access. So...
View ArticleBayshore Networks Announces General Availability Of SingleKey V5.0
Upgrades include advanced application behavior profiling
View ArticleTrend Micro Upgrades Mobile Device Management With Security And App Controls
TMMS 8.0 enhances the enforcement of existing password and encryption policies as well as provides more granular remote wipe capabilities
View ArticleWeekly Rewind – Oil Companies, NVIDIA, and Wall Street Hashes Galore & More…
Welcome to another edition of our Weekly Rewind – where we summarize all our posts from the last week. The top stories this week were 3) “More Password Hashes to Crack…from Wall Street IT Recruiter”,...
View ArticleResearch Finds 80 Percent Of Companies Do Not Use The Cloud Services They...
Meantime, 70 percent of companies would use these services if they were as robust as internal tools, according to Varonis Systems
View Articleavast! Free Antivirus Outperforms Competitors in Independent Test
avast! Free Antivirus outperformed multiple free and paid-for antivirus products in AV-TEST’s analysis of thirty-one consumer and business internet security products. The test, which concluded in June,...
View ArticleOnline accounts – change your passwords
There has been a lot of news recently concerning breaches exposing online credentials (LinkedIn, Yahoo voice, Android fourms, Yale, to name a few). Many of my friends have been asking me what should I...
View ArticleNitrozac and Snaggy: Not On My Watch
via the comic genius of Nitrozac and Snaggy at The Joy of Tech™
View ArticleFlame, Duqu and Stuxnet: in-depth code analysis of mssecmgr.ocx
The Flame worm (detected by ESET as Win32/Flamer) is one of the most interesting targeted threats of this year. Although several articles about it have been published, many of the facts about the...
View ArticleThe Future of Social Engineering 4: Tactical Research Using Social Networks
Read previous: The Future of Social Engineering 3: Creativity and Spear Phishing Sharon Conheady explains here how to use social networks to get to know your target, and provides some examples on how...
View ArticleSpamvertised Intuit themed emails lead to Black Hole exploit kit
By Dancho Danchev Cybercriminals are currently spamvertising millions of emails impersonating Intuit, in an attempt to trick end and corporate users into clicking on the malicious links found in the...
View Articlefast_pattern is fast
A fairly new reconnaissance tool called Skipfish was brought to our attention earlier this week. I wanted to take a few minutes and demonstrate a case where multiple rules using fast_pattern can be...
View ArticleNew Microsoft Malware Protection Center Threat Report Published: EyeStye
Recently I wrote a three part series of articles (part 1, part 2, part 3) on the evolving threat landscape in the European Union. As I wrote in these articles, there has been a steep rise in the...
View ArticleBeacon Podcast Episode 032
Hurricane Labs Beacon Podcast Episode Number: .032 – Nexus 7 Edition Hosts: Bill Mathews (@billford), Matt Yonchak (@mattyonchak), Patrick Sayler (@psayler), Tom Kopchak SECURITY Google Chrome sandbox...
View Article