Carpenter’s Letter
Saw this on Kottke’s blog today: ‘On the Occasion of Your Going Into Space”. Stunning. “…M. Scott Carpenter, Palmer Lake, Colorado - Dear Son, Just a few words on the eve of your great adventure for...
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticleCTO of Algosec talks about my blog post to Network World
Avishai Wool, CTO of AlgoSec and a professor at Tel-Aviv University, recently discussed a blog post I did for them with Network World about conflicts between IT and Information Security. Check out his...
View ArticleSOPA Score Card
via Propublica.org The inimitable ProPublica brings us the members of Congress who support and converserly oppose SOPA / PIPA. Fascinating take on whom, and whom is not, paid off… ♓
View ArticleNitrozac and Snaggy: Death Brush
via the genius of Nitrozac and Snaggy at The Joy of Tech™
View ArticleMegaupload’s Kim Dotcom getting his cars seized by NZ police. Check out the...
Megaupload's Kim Dotcom getting his cars seized by NZ police. Check out the whole Flickr set at flickr.com/photos/elliottkember/sets/72157628949521545/detail/via +Robin WautersIMG_0064I think GUILTY...
View ArticleEvent: ISACA Upcoming Educational events
The next two educational event organised by the ISACA MALTA CHAPTER are the following: January 26th 2012: The evolution of electronic evidence under Maltese Law by Martin Bajada http://goo.gl/Uf0rI...
View ArticleDreamHost Security Issue Prompts FTP Password Resets
Yesterday on the DreamHost Status Blog, it was announced that all shell/FTP passwords would be reset due to what looks to be a security breach that was discovered on one of the DreamHost database...
View ArticleSCADA Fact Check Failure
Brought to my already overburdened attention by the inimitable Gattaca, of LiquidMatrix, comes this well researched write-up by Krypt3ia detailing the display of a lack of basic research principles,...
View ArticleSSCC 80 – Mobile security podcast with Vanja Svajcer
In this week's podcast, Vanja Svajcer joins Chet to talk about the mobile security landscape. Topics discussed include mobile malware, theft, application markets and advice on securing your smartphone.
View ArticleSBN Sponsor Post
Attend the RSA Conference webcast .Using Online Advertising to Find Out if Your Data is Valuable to a Criminal. on January 25th.http://bit.ly/sGUunJ
View ArticleNetSec and Linux
Network Security requires having knowledge in a large number of areas. I can't think of a job in IT that requires a person to have at least some expertise in so many areas. How much a learning curve...
View ArticleOn Null Byte Poisoning and XPath Injection
Recently I released a tool called XMLmao, a configurable testbed for learning to exploit XPath injection flaws, developing new attack techniques for XPath injection flaws or simulating real-world XPath...
View ArticleCan IT Security Keep Pace in an Agile World?
There’s no better example of how much IT security is still considered an afterthought than the whole shift to agile application development. In theory, agile application development is a major business...
View ArticleUser Rights Agreements, or ‘Grant Us Your Immortal Soul’
The security of your company and its employees could be compromised if you don’t read and understand an End User License Agreements or (EULA) for new software.
View ArticleNew Platforms, Old Mistakes
You don’t need me to point you to stories such as this New York Times article that reported on data from Flurry, a mobile analytics firm to convince you that mobile app usage is growing exponentially....
View Article