Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

A New Hope

Rep. Mike Rogers (R-MI) and Rep. Dutch Ruppersberger (D-MD) know a secret:  The Federal government is REALLY good at watching people, much better than, say, the private sector.  So they asked...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Response Done Right

Here’s a feel good story to start the new year. Just before the holidays, we detected a cross-site scripting (XSS) vulnerability while running a web application scan for one of our customers. Nothing...

View Article


Image may be NSFW.
Clik here to view.

Constitution? We Don’t Need No Stinkin’ Constitution…

via Mark Frauenfelder at BoingBoing.com  

View Article

Image may be NSFW.
Clik here to view.

Microsoft Windows Azure To Host Linux Machines

News, of the apparent acquiescence of Microsoft Corporation’s (NasdaqGS: MSFT) Windows Azure group; detailing the acceptance of the inevitable: Linux distribution support on the Redmond Washington...

View Article

Image may be NSFW.
Clik here to view.

Building a Proactive Food Defense Program

ADT Commercial Security’s Don Hsieh, Director, Commercial & Industrial Marketing presents at the 2011 Food Technology & Safety Exchange Show  Recently, the annual Food Technology & Safety...

View Article


Image may be NSFW.
Clik here to view.

HNTV Episode 23

In this episode we talk about charity and how stealing is still a crime! We also discuss Strafor and Credit Card theft. Links for this episode: http://tinyurl.com/HNTVNAZI...

View Article

Image may be NSFW.
Clik here to view.

Spear Phishing: A Quick Review

Spear Phishing is very common to the traditional Phishing but more targeted to a specific group. Spear Phishing is define as an e-mail spoofing fraud attempt that targets a specific organization,...

View Article

Image may be NSFW.
Clik here to view.

Nitrozac and Snaggy: No Fun

via the tech comic genius of Notrozac and Snaggy at The Joy of Tech™

View Article


Image may be NSFW.
Clik here to view.

Pharma Wars: Mr. Srizbi vs. Mr. Cutwail

The previous post in this series introduced the world to “Google,” an alias chosen by the hacker in charge of the Cutwail spam botnet. Google rented his crime machine to members of SpamIt, an...

View Article


Image may be NSFW.
Clik here to view.

Saudi Hacker Posts 14K Credit Cards

An alleged Saudi hacker posted credit card information for approxiamanetly 400,000 Israeli users this week. The catch was that only 14,000 were valid. From Reuters: Computer hackers published details...

View Article

Image may be NSFW.
Clik here to view.

The Next Turn of the Wheel: Trust in a Digital World

“Those who cannot remember the lessons of history are condemned to repeat them.” -George Santayana It seems that 2011 was a year that tried our industry.  All things cyber grabbed headlines, and the...

View Article

Image may be NSFW.
Clik here to view.

Why do people expect so much more from mobile platforms?

Reading Veracode's recent post: Mobile Security – Android vs. iOS, which is an infographic comparing Android and iOS security, I'm left with a few questions, some of which I posted as a comment on...

View Article

Image may be NSFW.
Clik here to view.

Top 11 Trends For 2012 In Healthcare Data, According To Industry Experts

If the right actions are not taken, experts predict healthcare data breach will reach epidemic proportions this year

View Article


Image may be NSFW.
Clik here to view.

Another Facebook Worm On The Loose

Another worm is winding its way through Facebook gobbling up login credentials. From Ars Technica: A worm previously used to commit financial fraud is now stealing Facebook login credentials,...

View Article

Image may be NSFW.
Clik here to view.

And I Thought to be Protected!

The security market is constantly changing! A few years ago, there was the “UTM” (“Unified Threat Management“) market which offered to customers all-in-one solutions (firewall, anti-virus, IDS, VPN,...

View Article


Image may be NSFW.
Clik here to view.

Cloud Fundamentals Video Series: Cloud Computing Requires Transparency

By: Tim Rains, Director, Trustworthy Computing When Information Technology departments evaluate potential uses of cloud computing for their organization, many of them quickly realize they no longer...

View Article

Image may be NSFW.
Clik here to view.

Armed DHS Officers Set Up Unannounced ID Checkpoint

What is wrong in the US? Yes folks, it is coming down to this. Ever since the introduction of the Patriot Act the rights of the US citizenry have been dying a slow and painful death. From Infowars:...

View Article


Image may be NSFW.
Clik here to view.

January 2012 Patch Tuesday Preview

Microsoft is starting 2012 with a surprisingly large first release of seven security bulletins covering eight separate vulnerabilities. In contrast, in past years we usually had relatively small...

View Article

Image may be NSFW.
Clik here to view.

SBN Sponsor Post

RSA Conference US 2012 keynote lineup announced. Tony Blair to give closing keynote address.http://bit.ly/wrm3Aw

View Article

Image may be NSFW.
Clik here to view.

ShmooCon 2012 – January 27-29

ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions,...

View Article
Browsing all 37364 articles
Browse latest View live