The dangers of threat inflation in cybersecurity policy
In an article for the Harvard National Security Journal, Jerry Brito and Tate Watkins, wrote: There has been no shortage of attention devoted to cybersecurity, with a wide range of experts warning of...
View ArticleCupcake of Mass Destruction
The Transportion Security Administration display’s it level of competence; and why, exactly, how they have failed in their mission.
View ArticleNitrozac and Snaggy: Depression Apps
via the fertile imagination of Nitrozac and Snaggy at The Joy of Tech™
View ArticleNew computers – Kindle – More Encounters
A few random observations along the way: The Kindle has rebooted spontaneously a couple of times since I got it, and sometimes it refuses to connect to wireless unless it gets rebooted. Since the...
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticleSecurity Industry Plagiarism: Finding 3 examples in 5 minutes with Google
I was taught in grade school that if you plan on writing something, never plagiarize. If you want to republish portions of existing content get the author/owner's permission, and ensure you properly...
View ArticleBest of the Week – 8 gennaio 2012
Regular publications of the series "Best of the Week" are started again and here you can find my new selection of the best security resources of the week.Hope you enjoy it.@RIPE_NCC Vint Cerf: Internet...
View ArticleShekyan: SloMo DoS PoC
News of the latest Proof of Concept construct in denial of service attacks [DoS]: Slow Motion DoS, notably, involving minimal victim populations and apparently, in a well crafted modus: The leveraging...
View ArticleThe CSRF that almost was…
It’s strange sometimes where your inspiration comes from, but regardless of where, it’s good to be back in the saddle when it comes to really enjoying some research. Some people close to me might...
View Article1.5 m$ skimmed from US ATMs ! Neither Bank nor customers notice?
Last month, I wrote in my post " Youngest Team attempts to Raid an ATM in Mumbai " about two boys, one 12 and the other 15 who were caught trying to break open an ATM in Mumbai. These boys planned the...
View ArticleMalware Analysis Quant: The Malware Profile
As we resume our dive into each of the steps in our Malware Analysis process map, we wrap up the Malware Analysis sub-process by leveraging all of the analysis we’ve done in the previous few steps...
View ArticleSBN Sponsor Post
Attend the RSA Conference webcast .Using Online Advertising to Find Out if Your Data is Valuable to a Criminal. on January 25th.http://bit.ly/sGUunJ
View Article"The smartest person in the room is no longer a person but the room itself."
“The smartest person in the room is no longer a person but the room itself.” - What the...
View ArticleIntroduction to character encoding
"FACE WITH TEARS OF JOY" (U+1F602) Text encoding is a persistent source of pain and problems, especially when you need to communicate textual information across different systems. Every time you read...
View ArticleFacebook: 95% 0f All People Cant even Watch This Video F0r More Than 20 Seconds
Variants of this malware have appeared on Facebook in the last few months. Today’s version of the attack starts with a friend’s post that looks something like this: The link takes clickers to a...
View ArticleThe Steps To a Mature Visual Analytics Practice
The visualization maturity scale can be used to explain a number of issues in the visual analytics space. For example, why aren’t companies leveraging visualization to analyze their data? What are the...
View Article