Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Carpenter’s Letter

Saw this on Kottke’s blog today: ‘On the Occasion of Your Going Into Space”. Stunning. “…M. Scott Carpenter, Palmer Lake, Colorado - Dear Son, Just a few words on the eve of your great adventure for...

View Article


Image may be NSFW.
Clik here to view.

Best Explanation of SOPA So Far

View Article


Image may be NSFW.
Clik here to view.

(Image)

View Article

Image may be NSFW.
Clik here to view.

SBN Sponsor Post

Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l

View Article

Image may be NSFW.
Clik here to view.

CTO of Algosec talks about my blog post to Network World

Avishai Wool, CTO of AlgoSec and a professor at Tel-Aviv University, recently discussed a blog post I did for them with Network World about conflicts between IT and Information Security. Check out his...

View Article


Image may be NSFW.
Clik here to view.

SOPA Score Card

  via Propublica.org The inimitable ProPublica brings us the members of Congress who support and converserly oppose SOPA / PIPA. Fascinating take on whom, and whom is not, paid off… ♓  

View Article

Image may be NSFW.
Clik here to view.

Nitrozac and Snaggy: Death Brush

via the genius of Nitrozac and Snaggy at The Joy of Tech™

View Article

Image may be NSFW.
Clik here to view.

Megaupload’s Kim Dotcom getting his cars seized by NZ police. Check out the...

Megaupload's Kim Dotcom getting his cars seized by NZ police. Check out the whole Flickr set at flickr.com/photos/elliottkember/sets/72157628949521545/detail/via +Robin WautersIMG_0064I think GUILTY...

View Article


Image may be NSFW.
Clik here to view.

Event: ISACA Upcoming Educational events

The next two educational event organised by the ISACA MALTA CHAPTER are the following: January 26th 2012: The evolution of electronic evidence under Maltese Law by Martin Bajada http://goo.gl/Uf0rI...

View Article


Image may be NSFW.
Clik here to view.

SBN Sponsor Post

Follow RSA Conference on Twitter http://bit.ly/aUHdtm

View Article

Image may be NSFW.
Clik here to view.

DreamHost Security Issue Prompts FTP Password Resets

Yesterday on the DreamHost Status Blog, it was announced that all shell/FTP passwords would be reset due to what looks to be a security breach that was discovered on one of the DreamHost database...

View Article

Image may be NSFW.
Clik here to view.

SCADA Fact Check Failure

Brought to my already overburdened attention by the inimitable Gattaca, of LiquidMatrix, comes this well researched write-up by  Krypt3ia detailing the display of a lack of basic research principles,...

View Article

Image may be NSFW.
Clik here to view.

SSCC 80 – Mobile security podcast with Vanja Svajcer

In this week's podcast, Vanja Svajcer joins Chet to talk about the mobile security landscape. Topics discussed include mobile malware, theft, application markets and advice on securing your smartphone.

View Article


Image may be NSFW.
Clik here to view.

BonkersWorld: SOPIPA

Sums it up perfectly.

View Article

Image may be NSFW.
Clik here to view.

SBN Sponsor Post

Attend the RSA Conference webcast .Using Online Advertising to Find Out if Your Data is Valuable to a Criminal. on January 25th.http://bit.ly/sGUunJ

View Article


Image may be NSFW.
Clik here to view.

NetSec and Linux

   Network Security requires having knowledge in a large number of areas. I can't think of a job in IT that requires a person to have at least some expertise in so many areas. How much a learning curve...

View Article

Image may be NSFW.
Clik here to view.

On Null Byte Poisoning and XPath Injection

Recently I released a tool called XMLmao, a configurable testbed for learning to exploit XPath injection flaws, developing new attack techniques for XPath injection flaws or simulating real-world XPath...

View Article


Image may be NSFW.
Clik here to view.

Can IT Security Keep Pace in an Agile World?

There’s no better example of how much IT security is still considered an afterthought than the whole shift to agile application development. In theory, agile application development is a major business...

View Article

Image may be NSFW.
Clik here to view.

User Rights Agreements, or ‘Grant Us Your Immortal Soul’

The security of your company and its employees could be compromised if you don’t read and understand an End User License Agreements or (EULA) for new software.

View Article

Image may be NSFW.
Clik here to view.

New Platforms, Old Mistakes

You don’t need me to point you to stories such as this New York Times article that reported on data from Flurry, a mobile analytics firm to convince you that mobile app usage is growing exponentially....

View Article
Browsing all 37364 articles
Browse latest View live


Latest Images