Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Illinois Facebook bill stops employers from requesting into workers’ passwords

As of January 1, employers who ask for workers' social networking passwords can be fined $200+ in Illinois.

View Article


Image may be NSFW.
Clik here to view.

Review of Android security: AVAST the best bet

Nice review hereDigitaltrends.com from of top Android security apps.  And the winner is:  avast! Free Mobile Security! I love this quote:  “if you do want to go ahead and get an Android security app,...

View Article


Image may be NSFW.
Clik here to view.

A category for quantum mechanics jokes

As a follow-up to yesterday's post, I realized that it might be a good idea to start a new category on this blog. Maybe something like "quantum mechanics jokes." Then you'd know exactly where to go to...

View Article

Image may be NSFW.
Clik here to view.

AppSec Weekly News Roundup 8/3/2012

// Dropbox Email Spamming: Posted by Aditya Agarwal in the Dropbox blog, a post titled “Security update & new features,” addresses user complaints about spam they were receiving at email addresses...

View Article

Image may be NSFW.
Clik here to view.

Quick start guide on doing good deeds (in your office and community)

Go back in time for a moment: Do you remember when you were in school, say, as a 9th grader? You were probably thinking about who you’d like to be in the future, what high school would be like, what...

View Article


Image may be NSFW.
Clik here to view.

Poisoned DOC file used in targeted malware attack against military contractor

Firms and organisations are recommended to check hat they are keeping up-to-date with their security patches, in the light of a malware attack that was seen today - targeting a defence contractor.

View Article

Image may be NSFW.
Clik here to view.

Star Trek Crypto: Where Men Have Gone Before

Astonishing well wrought screed, targeting the strikingly flawed information security infrastructure within Star Trek story lines. ᴨ

View Article

Image may be NSFW.
Clik here to view.

The Economist Examines Supply Chain Risk

Posted by: Jeff Jones, Director, Trustworthy Computing If you are part of senior management in any company, you probably spend a lot your time mitigating risk.  Is the economy going to help or hurt our...

View Article


Image may be NSFW.
Clik here to view.

Weekly Rewind – Defcon Days, Password Problems & More…

Welcome to another edition of our Weekly Rewind – where we summarize all our posts from the last week. The top stories this week were 3) “Defcon Day 2 Talk Note – The DCWG Debriefing”, 2) “Defcon Day...

View Article


Image may be NSFW.
Clik here to view.

Advice, Demotive

via Unknown

View Article

Image may be NSFW.
Clik here to view.

OTOH: Big Tax Breaks for Apple’s Big Data Center in Nevada . My first of a...

OTOH: Big Tax Breaks for Apple's Big Data Center in Nevada.My first of a new series for +Forbes / +NetApp... ...by +Richi Jennings $AAPLOTOH: Big Tax Breaks for Apple's Big Data Center in Nevada - Forbes

View Article

Image may be NSFW.
Clik here to view.

In the News

Here are three security articles we found rather interesting this week. Researcher Wows Black Hat with NFC-based Smartphone Hacking Demo (CIO) Accuvant Labs researcher Charlie Miller has figured out...

View Article

Image may be NSFW.
Clik here to view.

An oldie but a goodie!  #007riday   Thomas Morffew originally shared this...

An oldie but a goodie!  #007riday  Thomas Morffew originally shared this post: Classic and always worth a repost, especially on #007riday  

View Article


Image may be NSFW.
Clik here to view.

Financial Fraud By Malicious Insiders Is Unsophisticated, Yet Costly

Dramatic bank heists may make for good movies, but a sneakier class of thieves are taking a “low and slow” approach to stealing financial data that allows them to go undetected for long periods of...

View Article

Image may be NSFW.
Clik here to view.

Arms dealing in cyberspace: Questions we need to answer

Alex Sanchez, Research Fellow at the Council on Hemispheric Affairs, and participant in the International Cybersecurity Dialogue, introduces the issues surrounding cyber arms dealing, especially as...

View Article


Image may be NSFW.
Clik here to view.

SBN Sponsor Post

Book 15 to 20 minutes of your time with Trainer Communications at Black Hat USA 2012 and learn how to maximize your investment in IT security public relations and secure the media and analyst coverage...

View Article

Image may be NSFW.
Clik here to view.

Why the Cybersecurity Bill Failed

The bill, it seems, is a no go. With all the cyber attacks, why did it fail? It was all sticks, no carrots. If the government wants to impose regulations and compliance, it should at...

View Article


Image may be NSFW.
Clik here to view.

What We’re Reading, Week of 7/30

InfoWorld – Android malware made easy with modular kit SearchEnterpriseWAN – Securing the Internet-connected branch office eWeek – BYOD Initiatives Grow, but Security Remains a Challenge TechCrunch –...

View Article

Image may be NSFW.
Clik here to view.

DropBox Security Breach: What it means to your business

Image via CrunchBase In what seems to be a common trend in Cloud service businesses, Dropbox announced a security breach this week in which an user e-mail addresses and passwords were obtained from an...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Act Blocked by Senate

We’ve covered all this cyber legislation stuff before and the big news yesterday was that the Cybersecurity Act of 2012 did not gain the 60 votes needed in the Senate to bring the measure up for a...

View Article
Browsing all 37364 articles
Browse latest View live