Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Minecraft Leakage

View Article


Image may be NSFW.
Clik here to view.

VMware vShield Automation with PowerShell

Alan Renouf has posted a PowerShell Module and a video with instructions on how to install and use it for VMware vShield. He shows clearly how to easily assess and report on current settings (i.e....

View Article


Image may be NSFW.
Clik here to view.

What Should You Really Eat? Digging into the linked site, +Harvard School of...

What Should You Really Eat?Digging into the linked site, +Harvard School of Public Health is perpetuating the unscientific belief that dairy, red meat and processed meat "cause" cancer. Look hard...

View Article

Image may be NSFW.
Clik here to view.

SecurityOrb.com’s Top 10 Cyber Security Threat Predictions for 2012

SecurityOrb.com’s Top 10 Cyber Security Threat Predictions for 2012

View Article

Image may be NSFW.
Clik here to view.

Hacking Back Part II

In my last blog on “Hacking Back” I asked is it legal, ethical, and do I have a right to defend my network against yours? Well, I believe it is legal and ethical, and absolutely, I have the right under...

View Article


Image may be NSFW.
Clik here to view.

Are weak passwords to blame for your data breach?

Since there has been a lot of ranting, many write-ups, and Twitter traffic over the relevance of weak passwords in the last few days with respect to the big data breaches... I thought about it some and...

View Article

Image may be NSFW.
Clik here to view.

Mobile Security – Android vs. iOS

With the dominance of iOS and the rising popularity of Android devices in the mobile marketplace, the security of these devices is a growing concern and focus for smartphone users. This infographic...

View Article

Image may be NSFW.
Clik here to view.

2012: A New Year – New Threats?

On behalf of Silver Tail Systems, I’d like to begin this blog post by wishing all of you a very Happy New Year. 2011 has come and gone, and with 2012 officially upon us, that can only mean one thing:...

View Article


Image may be NSFW.
Clik here to view.

Passwords: uniqueness, not complexity

Hacktivists recently broke into the StratFor website and dumped details of 800,000 accounts, including e-mail addresses and password-hashes. Since the password-hashes were simple MD5, it meant that...

View Article


Image may be NSFW.
Clik here to view.

Murderer’s Conviction Thrown Out Due To Computer Virus

OK, this is a new one for me. Convicted murderer, Randy Chaviano, had his conviction thrown out after the court stenographer had their computer infected with a virus. I have not heard of this type of...

View Article

Image may be NSFW.
Clik here to view.

SBN Sponsor Post

Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l

View Article

Image may be NSFW.
Clik here to view.

Annual Blog Round-Up – 2011

Here is my annual "Security Warrior" blog round-up of top 10 popular posts/topics in 2011. This list covers the posts most popular in 2011, not necessarily only those written in 2011. Disclaimer: all...

View Article

Image may be NSFW.
Clik here to view.

Who’s Who phish

And here, I thought I was finally famous.  It’s so disappointing. I got a “Weekly Follow-up from the National Academic Association.”  I suppose it doesn’t really matter that I’d never heard of them,...

View Article


Image may be NSFW.
Clik here to view.

BYOD: Why Bring Your Own Device Doesn’t Spell Disaster for Your Network’s...

by Tara Savage, Senior Marketing Manager, BT Global Services This holiday season was brought to you by the letters B.Y.O and D.  Those four letters spell a major shift in the technology world, one...

View Article

Image may be NSFW.
Clik here to view.

Malware Analysis Quant: Dynamic Analysis

As we described in the last post, your process to analyze malware typically starts with a static analysis of the malware file to yield some intelligence before you let the malware loose in the lab....

View Article


Image may be NSFW.
Clik here to view.

Malware exploits death of North Korea’s Kim Jong-il

As expected, malware developers and scam artists have greeted the death of North Korea's dictatorial leader, Kim Jong-il, with Black Hat SEO and Social Engineering attacks. The Supreme Leader of the...

View Article

Image may be NSFW.
Clik here to view.

Virtual Patch for ASP.Net Forms Authentication Bypass Vulnerability...

Last Thursday, Microsoft released an out-of-band security patch (MS11-100) which includes a fix for CVE-2011-3416:   An elevation of privilege vulnerability exists in the way that .NET Framework...

View Article


Image may be NSFW.
Clik here to view.

Rooting the Samsung Infuse: Change a File Permission

One of my favorite projects last year, I have to confess, was rooting the Motorola Defy. It came bundled with all kinds of crazy software that tries to force the use to link their accounts and data...

View Article

Image may be NSFW.
Clik here to view.

“your” legislators at work

Yeah, right Today’s threat to freedom and the Internet comes from our lawmakers…  Two bills pending in Congress (the PROTECT IP Act and the Stop Online Piracy Act (SOPA)) look OK at first glance… I...

View Article

Image may be NSFW.
Clik here to view.

Researchers find many weak Stratfor passwords

A professor at Utah Valley University analyzed the leaked password hashes stolen by Anonymous from security firm Stratfor and determined even their security minded customers choose weak passwords.

View Article
Browsing all 37364 articles
Browse latest View live