Geeks With Guns: Obama’s New Defense Plan Invests In Cyber Capabilities
“In silent bars, in silent rooms, in silent cars, you hide where you can. And me, I know just where you are, you see, I’m a bomber man” - From Bombers by Gary Numan This week President Obama released...
View ArticleStolen Stratfor mailing list used to Rickroll customers… This time
Customers of Stratfor who had their account details published by Anonymous last month started receiving joke spam messages today containing the famous Rickroll video. This message is a pertinent...
View ArticleCerf Says: Internet Not A Human Right
Not merely intelligentsia of the internet, Vinton G. Cerf, Ph.D., possesses a much-sought-after opinion machine is also the co-designer of the TCP/IP protocols and the underlying architecture of the...
View ArticleSymantec’s latest statement on source code theft
This is from a local Houston Symantec source, but is widely available to everyone. Current on date of posting. We’ll see what shakes out. “Symantec can confirm that a segment of its source code used in...
View ArticleSIRA Webinars
Quick cross post if you’re interested in watching some of the SIRA webinars. They’re available to everyone on the SIRA blog. Keefer/Pfost’s presentation on “Moneysec: Applying Moneyball…” here:...
View ArticleHeroes: Keith M. Little, USMC 24th Marines, 4th Marine Division – Navajo Code...
Deeply saddened to hear of the passing of Keith M. Little, PFC USMC 24th Marines, 4th Marine Division – WWII, Navajo Code Talker, United States of America Congressional Silver Medal holder and leader...
View ArticleWeekly Roundup : Jan 6, 2012 : Tracking and Disabling Cyber Attacks
Trending Security News The news this week had a science fiction style with reports that the Japanese Defense Ministry is nearing completion of a "seek-and-destroy" computer virus capable of disabling...
View ArticleSBN Sponsor Post
Attend the RSA Conference webcast .Using Online Advertising to Find Out if Your Data is Valuable to a Criminal. on January 25th.http://bit.ly/sGUunJ
View ArticleNew computers – Kindle – BC Libraries
Even before I was given a Kindle, I was vaguely interested. I use my local library a lot, and review and annotate stuff on their new system. Recently the library has been pushing the fact that ebooks...
View ArticleYou read it here first – London gets free wifi
The mass media have finally caught up with the December 28th entry in "When IT meets politics". Note the speed of the roll-out (due for completion inside 3 months) compared to the snail-like progress...
View ArticleSBN Sponsor Post
RSA Conference US 2012 keynote lineup announced. Tony Blair to give closing keynote address.http://bit.ly/wrm3Aw
View ArticleCybercrime: State of Online Piracy & Copyright Violations 2011
Online Piracy and Copyright violations in software, music, video, games and ebooks resulted in a 200 billion US$ loss worldwide. Such violations are perpetuated by file sharing P2P sites where...
View ArticleComputational Camouflage: Dynamic Face Substitution
Outstanding computation driven camouflage, via FlowingData. The implications should be relatively obvious, notwithstanding the equally evident obfuscation. ⋈
View ArticleHello to all my new followers. Welcome! Who do I have to thank for this...
Hello to all my new followers. Welcome!Who do I have to thank for this latest burst? Did someone share a circle?
View ArticleInfoSec career attitudes survey
I have a favor to ask- please consider taking a survey on attitudes about your career in Information Security. I’m helping a group of smart folks look into what makes InfoSec folks tick, and what...
View ArticleSBN Sponsor Post
Register for RSA Conference US by January 27, 2012 and save $400.http://bit.ly/mRTeE4
View ArticleTerrorism, SOPA And Zombies
The rhetoric towards hackers being generated by countries around the world continues to go from bad to worse. And this got me thinking about a few things. From AFP: Israel said on Saturday that it...
View ArticleThinking ahead to a data breach – designing applications for compromise
How do you, the owner of a compromised web site, re-set your user's accounts after a full compromise like Care2 or any number of recently hacked sites recently experienced? It's a lot more complex...
View Article