A New Hope
Rep. Mike Rogers (R-MI) and Rep. Dutch Ruppersberger (D-MD) know a secret: The Federal government is REALLY good at watching people, much better than, say, the private sector. So they asked...
View ArticleVulnerability Response Done Right
Here’s a feel good story to start the new year. Just before the holidays, we detected a cross-site scripting (XSS) vulnerability while running a web application scan for one of our customers. Nothing...
View ArticleConstitution? We Don’t Need No Stinkin’ Constitution…
via Mark Frauenfelder at BoingBoing.com
View ArticleMicrosoft Windows Azure To Host Linux Machines
News, of the apparent acquiescence of Microsoft Corporation’s (NasdaqGS: MSFT) Windows Azure group; detailing the acceptance of the inevitable: Linux distribution support on the Redmond Washington...
View ArticleBuilding a Proactive Food Defense Program
ADT Commercial Security’s Don Hsieh, Director, Commercial & Industrial Marketing presents at the 2011 Food Technology & Safety Exchange Show Recently, the annual Food Technology & Safety...
View ArticleHNTV Episode 23
In this episode we talk about charity and how stealing is still a crime! We also discuss Strafor and Credit Card theft. Links for this episode: http://tinyurl.com/HNTVNAZI...
View ArticleSpear Phishing: A Quick Review
Spear Phishing is very common to the traditional Phishing but more targeted to a specific group. Spear Phishing is define as an e-mail spoofing fraud attempt that targets a specific organization,...
View ArticleNitrozac and Snaggy: No Fun
via the tech comic genius of Notrozac and Snaggy at The Joy of Tech™
View ArticlePharma Wars: Mr. Srizbi vs. Mr. Cutwail
The previous post in this series introduced the world to “Google,” an alias chosen by the hacker in charge of the Cutwail spam botnet. Google rented his crime machine to members of SpamIt, an...
View ArticleSaudi Hacker Posts 14K Credit Cards
An alleged Saudi hacker posted credit card information for approxiamanetly 400,000 Israeli users this week. The catch was that only 14,000 were valid. From Reuters: Computer hackers published details...
View ArticleThe Next Turn of the Wheel: Trust in a Digital World
“Those who cannot remember the lessons of history are condemned to repeat them.” -George Santayana It seems that 2011 was a year that tried our industry. All things cyber grabbed headlines, and the...
View ArticleWhy do people expect so much more from mobile platforms?
Reading Veracode's recent post: Mobile Security – Android vs. iOS, which is an infographic comparing Android and iOS security, I'm left with a few questions, some of which I posted as a comment on...
View ArticleTop 11 Trends For 2012 In Healthcare Data, According To Industry Experts
If the right actions are not taken, experts predict healthcare data breach will reach epidemic proportions this year
View ArticleAnother Facebook Worm On The Loose
Another worm is winding its way through Facebook gobbling up login credentials. From Ars Technica: A worm previously used to commit financial fraud is now stealing Facebook login credentials,...
View ArticleAnd I Thought to be Protected!
The security market is constantly changing! A few years ago, there was the “UTM” (“Unified Threat Management“) market which offered to customers all-in-one solutions (firewall, anti-virus, IDS, VPN,...
View ArticleCloud Fundamentals Video Series: Cloud Computing Requires Transparency
By: Tim Rains, Director, Trustworthy Computing When Information Technology departments evaluate potential uses of cloud computing for their organization, many of them quickly realize they no longer...
View ArticleArmed DHS Officers Set Up Unannounced ID Checkpoint
What is wrong in the US? Yes folks, it is coming down to this. Ever since the introduction of the Patriot Act the rights of the US citizenry have been dying a slow and painful death. From Infowars:...
View ArticleJanuary 2012 Patch Tuesday Preview
Microsoft is starting 2012 with a surprisingly large first release of seven security bulletins covering eight separate vulnerabilities. In contrast, in past years we usually had relatively small...
View ArticleSBN Sponsor Post
RSA Conference US 2012 keynote lineup announced. Tony Blair to give closing keynote address.http://bit.ly/wrm3Aw
View ArticleShmooCon 2012 – January 27-29
ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions,...
View Article