Fake Camera+ app hits the iPhone App Store
Be careful what applications you install on your computing devices - even if they come from Apple's iPhone/iPad App Store.
View ArticleIntersections of lines from adding points on an elliptic curve
I was playing with a graphing program this morning and tried graphing an elliptic curve and all of the lines that you'd use to add the points on the curve with integer coordinates using the...
View ArticleFatuitas Ipsomanifestosis Lorem: Oracle Codifies New Record
Notwithstanding the already superb coverage by Ericka Chickowski at DarkReading, the dearth of Oracle Database Security Updates is certainly grating me, similar to an itch I once could not scratch....
View ArticleBumper Sticker “wisdom”
I saw a bumper sticker the other day that made me think about the trite things often said in InfoSec. The bumper sticker said (paraphrasing): “War never solved anything, except ending communism,...
View ArticleYubico Reports 2011 Record Growth, Outlook For 2012
Yubico ended 2011 with more than 1 million users and 18,000 customers in 100 countries
View ArticleBB&T Payment Solutions Offers Free Data Security Webinar For Small Business...
Designed to help small business owners navigate, understand and protect their businesses from security pitfalls
View ArticlePredictability and Visibility: The Cure for Sleepless Nights
What makes security, risk and compliance officers sleep at night? Key factors include: visibility, predictability, optimization & business alignment.
View ArticleWatchDox Introduces Secure Annotation, Collaboration For iPad, iPhone
Allows enterprises to support mobile collaboration while maintaining control over documents
View ArticlePinky and The Brain Make Lastest Move
To Take Over The World… by Jay P. Fosgitt and via The Uniblog at theuniblog.evilspacerobot.com
View ArticleImplementing and Managing a DLP Solution
I’ve been so tied up with the Nexus, CCSK, and other projects that I haven’t been blogging as much as usual… but not to worry, it’s time to start a nice, juicy new technical series. And, once again, I...
View ArticlePacket Plus Introduces Interactive Networking Stack Debugger
P+ 1000 offers packet-by-packet control
View ArticleVulnerability Summary for the Week of January 16, 2012
This bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) the week of January...
View ArticleUnderstanding the apathetic response to a cyber attack
Anyone who knows me knows I'm a big fan of MMA, and the UFC in general. So when over the weekend the UFC website was 'hijacked' and attacked by a group calling itself the "the Underground Nazi...
View ArticleNot Quite Dead Yet
Things are still extremely busy with day jobs, side projects and foster kids. However, I will be at ShmooCon 2012! So hit me up on twitter if you want to have some beers. See you there!
View ArticleTED, SOPA, PIPA
In this blog, I usually do not get involved in politics. This time, I'll make an exception.If you do not know what SOPA and/or PIPA are, or if you haven't made up your mind yet, please head over to...
View ArticleFarewell, Google Message Continuity, we hardly knew ya. This week’s Mobility...
Farewell, Google Message Continuity, we hardly knew ya.This week's Mobility Matters...for +Esther Schindler's #HPIO $GOOGFarewell, Google Message Continuity, we hardly kne... - Input...
View ArticleBloggers Beware: InfoSec Island
In Brief: InfoSec Island may not post what you submit, but instead grab text from your blog (whether authorized or not). When I filed a complaint, their first response was to threaten to delete the...
View ArticleNew Continuous Monitoring Webinar
A key security initiative for government agencies is the implementation of continuous monitoring. nCircle’s new webinar can provide insight into agency implementations of continuous monitoring and...
View ArticleJust Another Risk Podcast NOT
Continuing my series of podcasts on all things Risk, I have another great one in this episode. I am joined by an all star panel of HD Moore, CSO of Rapid7 and founder of Metasploit, Ron Gula, CEO and...
View ArticleVideo: FireAMP Advanced Malware Protection
To further support today's unveiling of FireAMP, please watch this video showing the product's functionality. This video demonstrates the visibility FireAMP extends to enterprises in identifying the...
View Article