Searching for Malware 4: exploring Twitter accounts
Read previous: Searching for Malware 3: Trending Topics Exploiting In this part, David and Paul speak more specifically on Twitter usage patterns they retrieved, and outlined a number of distinct user...
View ArticleCell Phone Safety Tips for Kids
Getting your kids ready to disengage from summer fun and head back into the classroom can be a little painful. And you might be sweetening the deal by getting them new cell phones or even a first cell...
View ArticleMac OSX/iOS hacks at Blackhat – are scammers setting their sights?
For years scammers and hackers focused largely on Windows x86-based platforms, in many ways because that’s where the bulk of the users were. But times change, and new targets emerge. At Blackhat and...
View ArticleThrowing stones in glass houses – A viewpoint on the security industry
Let's face it, Information Security is a mixed bag. Sometimes you're the windshield, and sometimes you're the bug - but many of us fail to grasp that while we watch someone else's house burn down...
View ArticleOlympic malware poses as US Women’s Gymnastics scandal video
US gymnast Gabrielle Douglas has won a gold medal at the London Olympics - but a spammed out message claims that she is embroiled in a drug scandal. Should you rush to watch the video? Of course not,...
View ArticleUS missile defense staff told to stop watching porn
U.S. missile defense workers have been warned that porn on the job is not allowed. It's not just a problem of public security due to distraction, but there's also a computer security due to malware...
View ArticleInfoSec Daily Podcast Episode 732
Episode 732 - Yahoo Sued, EPA Breach, South Korean Arrest, Boston Water, Cyberbill Dead?,RIM Rebuffs, Attack Surface Analyzer
View ArticleHP TouchPad gets Android 4.1 Jelly Bean
If you own an HP TouchPad, you may be pleased to find out that the device has been hacked to run Android 4.1 (Jelly Bean). It's currently available in a very early preview of a CyanogenMod 10 build.
View ArticleSBN Sponsor Post
Book 15 to 20 minutes of your time with Trainer Communications at Black Hat USA 2012 and learn how to maximize your investment in IT security public relations and secure the media and analyst coverage...
View ArticleGeneric vs. Specialized Document Sharing in the Cloud
There has been a lot of buzz around the new entrant into the cloud-based document sharing space with the recent announcement of Google Drive. But not all cloud-based document sharing is the same....
View ArticleMalware warning: Your AT&T bill is ready to be viewed
Cybercriminals are pushing fake AT&T e-mails in the hopes you'll think you forgot to pay your bill. This is a scam: the links inside do not point to AT&T but a website that tries to put malware...
View ArticleReuters hacked, fake news posted
Thomson Reuters has confirmed the Reuters News blogging platform was hacked and that a false interview with a Syrian rebel leader was posted. The Reuters blogging website has been taken down to fix the...
View ArticleKnowBe4 And Kevin Mitnick Offer Free Cybercrime Prevention Tips For Upcoming...
Tips created to help convention attendees protect their personal information and mobile devices from cyberattacks
View ArticleWatchGuard Sets New Standard For Next-Generation UTM
WatchGuard XTM 5 Series network security appliances aimed at midsize businesses
View ArticleYahoo Sued Over Password Leak
The next chapter in the story about the recent Yahoo password breach is coming to fruition as a New Hampshire man filed a lawsuit against Yahoo last week. He’s alleging that a breakdown of Yahoo’s...
View ArticlePuhleese, Baby, Baby, Puhleese: OSX All Youse Addresses Are Us
Typically well-crafted screed, via the eponymous TUAW focusing on the Mountain Lion address book request process, and maybe, just maybe, it might very well be legit. ᴥ , ᶕ
View ArticleCloud Security – Implementing a Secure Cloud Backup Case Study
Secure cloud backup is a scenario which increasingly gains traction. It allows organizations to implement an off-site backup while maintaining costs at a minimum. In this blog post I would like to...
View ArticleNitrozac and Snaggy: Creepings
via the comic genius of Nitrozac and Snaggy at The Joy of Tech™
View ArticleYour Org Chart tells a security story
Talking to other practitioners, there are some common organizational challenges that everyone has lived through. One of those is the unintended consequences of poor organizational alignment for the...
View ArticleCyber Security Bill Considered By The White House
After Senate Republicans last week blocked the passage of a cyber security bill, the White House is considering reviving the legislation through an executive order, according to a report this weekend....
View Article