Apple Mac in-app purchases hacked; everything free like on iOS
While Apple is working hard to fight the hacking of its In-App Purchase program for iOS, the same hacker has pulled off almost an almost identical scheme for the Mac. Just like on iOS, this means you...
View Article"Digital Forensics Case Leads: Skype acting weird, Mircosoft backdooring...
In this week of Case Leads, we hear lot of Skype problems, claims that Microsoft is backdooring Skype and Facebook censoring chats for illegal activitiesMoreover, Apple seems to fail on fixing a bug...
View ArticleCool! Google Search by Image . #HPIO UK for + HPUK by Daniel and + Sally...
Cool! Google Search by Image. #HPIO UK for +HPUK by Daniel and +Sally Wiener Grotta...Cool! Google Search by Image - Input Output
View ArticleObama: Cyber attack serious threat to economy, national security
U.S. President Barack Obama is urging the Senate to pass the Cybersecurity Act of 2012. He believes legislation will help the U.S. fight "the cyber threat to our nation," which he calls "one of the...
View Article68,000 Password Hashes from Fish Enthusiast Forum
Ahhh … YAPHB (yet another password hash breach)… this time on the Cichlids Forums. The site that we originally read this story on is CyberWarNews.info where they referenced some basic email address...
View ArticleChinatown Sues over Shark Fin Ban
Towards the end of last year sentiment in China clearly was turning against the market for shark fin, as reported in xinhuanet. A Chinese lawmaker has proposed that the country's top legislature ban...
View ArticleSBN Sponsor Post
Book 15 to 20 minutes of your time with Trainer Communications at Black Hat USA 2012 and learn how to maximize your investment in IT security public relations and secure the media and analyst coverage...
View ArticleAnother article for Infosecurity Magazine
Unfortunately, I don’t have much time for writing about Apple security at the moment. Unfortunate, because there’s quite a lot to say about it. But I did manage to write something for Infosecurity...
View ArticleSBN Sponsor Post
Book 15 to 20 minutes of your time with Trainer Communications at Black Hat USA 2012 and learn how to maximize your investment in IT security public relations and secure the media and analyst coverage...
View ArticleSymposium Presentations Available / The Future of OSSEC
Trend did a great job of outlining our plan for OSSEC in this post. They begin by describing the Symposium, just as I did in my previous post, then go on to lay out a detailed plan for the future. A...
View ArticleRussian hacker’s App Store fraud site adds Mac support
ZonD Eighty, the Russian hacker who brought App Store fraud to unjailbroken iPads and iPhones, has extended his "service" to OS X users. Mac owners can now join their iDevice brethren in ripping off...
View ArticleSBN Sponsor Post
Book 15 to 20 minutes of your time with Trainer Communications at Black Hat USA 2012 and learn how to maximize your investment in IT security public relations and secure the media and analyst coverage...
View ArticleScan from a Hewlett-Packard ScanJet
I received several mails recently that my document was scanned and sent to me.Subjects may be (there are many variants where the number differs):Re: Scan from a HP ScanJet #920330420Fwd: Re: Scan from...
View ArticleSymantec board boots ex-CEO Enrique Salem . – including contribution from +...
Symantec board boots ex-CEO Enrique Salem.- including contribution from +Richard Stiennon. Today's #ITBW for +Computerworld by +Richi Jennings...$SYMCSymantec board boots ex-CEO Enrique Salem
View ArticleThe CIA Triad: Theory and Practice
Recently Bloginfosec.com published an article by Warren Axelrod entitled, It’s About Availability and Integrity (not so much Confidentiality). It appears that the article generated a bit of controversy...
View ArticleTelling Big Iron What to Do . In the beginning was machine code How did...
Telling Big Iron What to Do.In the beginning was machine code How did today's high-level languages evolve? #HPIO UK for +HPUK by +Peter H. Salus... Telling Big Iron What to Do - Input Output
View ArticleGoogle pleads for YouTube real-name use
Google is attempting to clean up YouTube commentary, by pleading with commenters to use real names when posting.
View ArticleSBN Sponsor Post
Book 15 to 20 minutes of your time with Trainer Communications at Black Hat USA 2012 and learn how to maximize your investment in IT security public relations and secure the media and analyst coverage...
View ArticlePorticor Joins Amazon Web Services Partner Network To Help Further Protect...
Porticor’s Virtual Private Data System Delivers Cloud Encryption with 1-Click Deployment Available from the AWS Marketplace TEL AVIV, Israel – July 26, 2012 – Porticor®, a leading cloud data...
View ArticleBlack Hat Survey: 36% Of Information Security Professionals Have Engaged In...
Some IS pros believe retaliatory attacks may discourage further attacks, according to nCircle
View Article