Latest Snort provides alarm for industrial control systems
Latest Snort provides alarm for industrial control systems - The H Security: News and Features:Nice publicity for Snort 2.9.2. as result of years of work.
View ArticleSBN Sponsor Post
Register for RSA Conference US by January 27, 2012 and save $400.http://bit.ly/mRTeE4
View Article3 things Google Apps needs to fix… like, NOW! The deal with Google, will see...
3 things Google Apps needs to fix... like, NOW!The deal with Google, will see the multinational bank migrate 110,000 users to Google Apps -- the cloud-based collaboration platform. Let's take The Long...
View ArticleBanks Tackle Cybercrime Through Information Sharing
According to PWC’s 2012 Global State of Information Security Survey, only 80% of financial services survey respondents are sure that their organizations are prepared to address the threats that...
View ArticleYou Can’t Outsource Responsibility
My friends over in Belgium at the /dev/random blog had a good post up the other day called “Everything Can Be Outsourced But Not Your Responsibility“. The post was really about a recent incident...
View ArticleSmartPhone App Security Advice
Smartphones really are a fraudster’s paradise, there are so many opportunities for fraudsters to monetise from them. From Rogue Malicious Apps sending premium rate text messages costing up to £6 a...
View ArticleSecurity Screener Layoffs at Pearson Airport
Who are the geniuses that are responsible for this boneheaded move? The wait times at the airport in Toronto have been bad enough historically but, to cut 300 security screener jobs blows my mind....
View ArticleToday’s networks are evil.
Says the first line of the presentation entitled “Building a Distributed Satellite Ground Station Network – A Call To Arms” given some time ago at the 28th Chaos Communication Congress (28C3) in Berlin...
View ArticleDavos and Hacking
According to the international organisation, famous for its annual conferences held in the Swiss resort of Davos, cyber-attacks come in at number four of the risks most likely to materialise: just...
View ArticleApplication Interaction: Friend or Foe
There are two words that I fear more than any other, and I imagine the same is true for most other vendors. Those magical two words that send shivers down spines of support and make grown engineers...
View ArticleIn this edition of “Security Spot” New Year, New Password
By Daniel Cabarcos, StillSecure SOC Analyst I’ve gone through the typical New Year’s resolution of eating healthier and losing some weight gained from the holidays (yes, I blame the last few decades on...
View ArticleStratfor CEO Responds About Hacking
The CEO of Stratfor, George Friedman, posted this video response to the hacking incident that their company suffered on Dec 24, 2011. When attempting to view their published response it appears that...
View ArticleSymantec: What Went Wrong?
Symantec: What Went Wrong? by Bill Mathews A little while ago some (allegedly) Indian based hackers (ref: http://hlurl.com/8qv, http://hlurl.com/8qw) announced that they got their hands on some of...
View ArticleFraming with Chris Hadnagy tonight on Episode 273 at 6PM ET
Thursday night, Episode 273 of PaulDotCom Security Weekly features a special Guest Technical Segment from author, podcaster and trainer Chris "LoganWHD" Hadnagy from the Social-Engineer.org website....
View ArticleCyber Security and Hollywood: More In Common Than You May Think
Several months ago, I discussed the decline of the U.S as an innovator as part of my Industry Evolution: Innovation vs. Spending series. While a tough pill to swallow, it was true then and it continues...
View ArticleFacebookery: Prevarication Running Rampant In Face of Federal Scrutiny
In an absolutely tremendous write-up at Sophos’s NakedSecurity [a fellow Security Bloggers Network member] Lisa Vaas regales us with the sidestepping of privacy related interrogatories levelled at the...
View ArticleMerchants push back on credit card breach fines
We’ve noted the often staggering fees associated with a credit card breach, normally accompanied by a slew of bad press. Also, Stratfor, in light of their recent hack, has also been dealing with public...
View ArticleData Loss Prevention – Step 5: Disable access to ‘cloud storage’ services
Some time ago I started a series on Data Loss Prevention in a very frank, matter-of-fact, and un-enigmatic way. I've been trying to dispel the myth that DLP is a blinking box you can buy, or a...
View ArticleOne Year Recap of the Food Safety Modernization Act Implementation
This month marks year-one of the Food Safety Modernization Act (FSMA), signed by President Barack Obama, and enforced by the Food and Drug Administration (FDA). The objective of the legislation is to...
View Article