VMware vShield Automation with PowerShell
Alan Renouf has posted a PowerShell Module and a video with instructions on how to install and use it for VMware vShield. He shows clearly how to easily assess and report on current settings (i.e....
View ArticleWhat Should You Really Eat? Digging into the linked site, +Harvard School of...
What Should You Really Eat?Digging into the linked site, +Harvard School of Public Health is perpetuating the unscientific belief that dairy, red meat and processed meat "cause" cancer. Look hard...
View ArticleSecurityOrb.com’s Top 10 Cyber Security Threat Predictions for 2012
SecurityOrb.com’s Top 10 Cyber Security Threat Predictions for 2012
View ArticleHacking Back Part II
In my last blog on “Hacking Back” I asked is it legal, ethical, and do I have a right to defend my network against yours? Well, I believe it is legal and ethical, and absolutely, I have the right under...
View ArticleAre weak passwords to blame for your data breach?
Since there has been a lot of ranting, many write-ups, and Twitter traffic over the relevance of weak passwords in the last few days with respect to the big data breaches... I thought about it some and...
View ArticleMobile Security – Android vs. iOS
With the dominance of iOS and the rising popularity of Android devices in the mobile marketplace, the security of these devices is a growing concern and focus for smartphone users. This infographic...
View Article2012: A New Year – New Threats?
On behalf of Silver Tail Systems, I’d like to begin this blog post by wishing all of you a very Happy New Year. 2011 has come and gone, and with 2012 officially upon us, that can only mean one thing:...
View ArticlePasswords: uniqueness, not complexity
Hacktivists recently broke into the StratFor website and dumped details of 800,000 accounts, including e-mail addresses and password-hashes. Since the password-hashes were simple MD5, it meant that...
View ArticleMurderer’s Conviction Thrown Out Due To Computer Virus
OK, this is a new one for me. Convicted murderer, Randy Chaviano, had his conviction thrown out after the court stenographer had their computer infected with a virus. I have not heard of this type of...
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticleAnnual Blog Round-Up – 2011
Here is my annual "Security Warrior" blog round-up of top 10 popular posts/topics in 2011. This list covers the posts most popular in 2011, not necessarily only those written in 2011. Disclaimer: all...
View ArticleWho’s Who phish
And here, I thought I was finally famous. It’s so disappointing. I got a “Weekly Follow-up from the National Academic Association.” I suppose it doesn’t really matter that I’d never heard of them,...
View ArticleBYOD: Why Bring Your Own Device Doesn’t Spell Disaster for Your Network’s...
by Tara Savage, Senior Marketing Manager, BT Global Services This holiday season was brought to you by the letters B.Y.O and D. Those four letters spell a major shift in the technology world, one...
View ArticleMalware Analysis Quant: Dynamic Analysis
As we described in the last post, your process to analyze malware typically starts with a static analysis of the malware file to yield some intelligence before you let the malware loose in the lab....
View ArticleMalware exploits death of North Korea’s Kim Jong-il
As expected, malware developers and scam artists have greeted the death of North Korea's dictatorial leader, Kim Jong-il, with Black Hat SEO and Social Engineering attacks. The Supreme Leader of the...
View ArticleVirtual Patch for ASP.Net Forms Authentication Bypass Vulnerability...
Last Thursday, Microsoft released an out-of-band security patch (MS11-100) which includes a fix for CVE-2011-3416: An elevation of privilege vulnerability exists in the way that .NET Framework...
View ArticleRooting the Samsung Infuse: Change a File Permission
One of my favorite projects last year, I have to confess, was rooting the Motorola Defy. It came bundled with all kinds of crazy software that tries to force the use to link their accounts and data...
View Article“your” legislators at work
Yeah, right Today’s threat to freedom and the Internet comes from our lawmakers… Two bills pending in Congress (the PROTECT IP Act and the Stop Online Piracy Act (SOPA)) look OK at first glance… I...
View ArticleResearchers find many weak Stratfor passwords
A professor at Utah Valley University analyzed the leaked password hashes stolen by Anonymous from security firm Stratfor and determined even their security minded customers choose weak passwords.
View Article