Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Grecs’ Weekend Best Bets for 2012-07-20

Here it is again … another of our weekly “Best Bets” posts… As we’ve previously noted most local meetups seem to be crowded into weekday evenings with almost nothing on the weekend. The purpose of...

View Article


Image may be NSFW.
Clik here to view.

BlackHat WormHole

Apparently BlackHat has become so big it literally makes the last days of July disappear. It might be hard on the business expense report form but what happens in the hole stays in the hole. Here's an...

View Article


Image may be NSFW.
Clik here to view.

Social-Engineer.org is Vegas Bound Baby!

By Chris Hadnagy 20 years. Hard to believe, but Defcon has been around for 2 decades. And Black Hat has been doing its thing for 15 years and continues to buck the conference trend and grow in...

View Article

Image may be NSFW.
Clik here to view.

Off Air -for now we will be back!

Miss our sexy voices? Our illogical logic? Our “geeky” rants? Our infinite wisdom? If you answered yes to any of these questions it is likely that you are missing our podcasts.  Well without making...

View Article

Image may be NSFW.
Clik here to view.

Norman Rolls Out New Version Of Malware Analyzer G2

Norman Malware Analyzer G2 provides Hybrid SandBoxing

View Article


Image may be NSFW.
Clik here to view.

Rackspace Cloud Security Tip #2

Create Rackspace Security Groups In our last post on securing Rackspace cloud servers, we talked about closing service ports like RDP and SSH to ward off hackers and enable secure, remote access. So...

View Article

Image may be NSFW.
Clik here to view.

Bayshore Networks Announces General Availability Of SingleKey V5.0

Upgrades include advanced application behavior profiling

View Article

Image may be NSFW.
Clik here to view.

Trend Micro Upgrades Mobile Device Management With Security And App Controls

TMMS 8.0 enhances the enforcement of existing password and encryption policies as well as provides more granular remote wipe capabilities

View Article


Image may be NSFW.
Clik here to view.

CERN: Higgs Boson

View Article


Image may be NSFW.
Clik here to view.

Weekly Rewind – Oil Companies, NVIDIA, and Wall Street Hashes Galore & More…

Welcome to another edition of our Weekly Rewind – where we summarize all our posts from the last week. The top stories this week were 3) “More Password Hashes to Crack…from Wall Street IT Recruiter”,...

View Article

Image may be NSFW.
Clik here to view.

Research Finds 80 Percent Of Companies Do Not Use The Cloud Services They...

Meantime, 70 percent of companies would use these services if they were as robust as internal tools, according to Varonis Systems

View Article

Image may be NSFW.
Clik here to view.

avast! Free Antivirus Outperforms Competitors in Independent Test

avast! Free Antivirus outperformed multiple free and paid-for antivirus products in AV-TEST’s analysis of thirty-one consumer and business internet security products. The test, which concluded in June,...

View Article

Image may be NSFW.
Clik here to view.

Online accounts – change your passwords

There has been a lot of news recently concerning breaches exposing online credentials (LinkedIn, Yahoo voice, Android fourms, Yale, to name a few). Many of my friends have been asking me what should I...

View Article


Image may be NSFW.
Clik here to view.

Nitrozac and Snaggy: Not On My Watch

via the comic genius of Nitrozac and Snaggy at The Joy of Tech™

View Article

Image may be NSFW.
Clik here to view.

Flame, Duqu and Stuxnet: in-depth code analysis of mssecmgr.ocx

The Flame worm (detected by ESET as Win32/Flamer) is one of the most interesting targeted threats of this year. Although several articles about it have been published, many of the facts about the...

View Article


Image may be NSFW.
Clik here to view.

The Future of Social Engineering 4: Tactical Research Using Social Networks

Read previous: The Future of Social Engineering 3: Creativity and Spear Phishing Sharon Conheady explains here how to use social networks to get to know your target, and provides some examples on how...

View Article

Image may be NSFW.
Clik here to view.

Spamvertised Intuit themed emails lead to Black Hole exploit kit

By Dancho Danchev Cybercriminals are currently spamvertising millions of emails impersonating Intuit, in an attempt to trick end and corporate users into clicking on the malicious links found in the...

View Article


Image may be NSFW.
Clik here to view.

fast_pattern is fast

A fairly new reconnaissance tool called Skipfish was brought to our attention earlier this week. I wanted to take a few minutes and demonstrate a case where multiple rules using fast_pattern can be...

View Article

Image may be NSFW.
Clik here to view.

New Microsoft Malware Protection Center Threat Report Published: EyeStye

Recently I wrote a three part series of articles (part 1, part 2, part 3) on the evolving threat landscape in the European Union.  As I wrote in these articles, there has been a steep rise in the...

View Article

Image may be NSFW.
Clik here to view.

Beacon Podcast Episode 032

Hurricane Labs Beacon Podcast Episode Number: .032 – Nexus 7 Edition Hosts: Bill Mathews (@billford), Matt Yonchak (@mattyonchak), Patrick Sayler (@psayler), Tom Kopchak SECURITY Google Chrome sandbox...

View Article
Browsing all 37364 articles
Browse latest View live