Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The Microsoft-Kelihos Tango Continues

Microsoft is going all out on hammering the last nail on Kelihos’s coffin. The takedown that took place 4 months ago is just the beginning. The software giant filed a complaint on Monday, January 23,...

View Article


Image may be NSFW.
Clik here to view.

Microsoft: Worm Operator Worked at Antivirus Firm

In a surprise filing made late Monday, Microsoft said a former technical expert at a Russian antivirus firm was the person responsible for operating the Kelihos botnet, a global spam machine that...

View Article


Image may be NSFW.
Clik here to view.

SSCC 81 – NCSA and Data Privacy Day

Chet sits down with Michael Kaiser, Executive Director at the National Cyber Security Alliance (NCSA) to discuss Data Privacy Day. Michael explains the origin of Data Privacy Day, some of the...

View Article

Image may be NSFW.
Clik here to view.

Online Safety

A couple of weeks ago, I ran a highly unscientific survey on twitter. Asking what advice would people give to children about security. The response was overwhelmingly in favour of educating them to be...

View Article

Image may be NSFW.
Clik here to view.

Wikileaks and SharePoint

Bradley Manning is on trial. For some reason, we didn't find this Wired article linking Manning's document download spree with SharePoint until now. Here are the key passages: Special agent David...

View Article


Image may be NSFW.
Clik here to view.

Megaup…d’oh.

You’re probably aware that Megaupload has wandered into what can only be described as a bit of a pickle, assuming said pickle is roughly the size of a Vogon Constructor Fleet. Given that lots of people...

View Article

Image may be NSFW.
Clik here to view.

vCenter Events and Alarms

Veeam Software, a business continuity product company for virtualization, has a complete list of vCenter Events sorted by ID. Here's the first event in the list: ID Severity Group Message Catalog Text...

View Article

Image may be NSFW.
Clik here to view.

Your [online] Reputation Precedes You

By: Brendon Lynch, Chief Privacy Officer for Microsoft Whenever someone tells me, “your reputation precedes you,” my immediate thought is I hope they mean that in a good way. As we conduct more of our...

View Article


Image may be NSFW.
Clik here to view.

Is there really no innovation in information security?

According to a recent article on the CSO magazine web site, there's not enough innovation in the information security industry to let businesses keep up with the ever-changing threats that they face....

View Article


Image may be NSFW.
Clik here to view.

Rapid7 Exposé: Boardroom P0wn

Tremendous write-up at The New York Times, by Times reporter Nicole Perlroth, detailing the outstanding information security research of HD Moore and Mike Tuchen, the CSO [and Chief Architect of...

View Article

Image may be NSFW.
Clik here to view.

Security-to-Business: Some translation required

I’ve had a lot of interest around my recent posts on how to communicate the value of information security to the business.  With that in mind, I wanted to share a method used by one of the enterprises...

View Article

Image may be NSFW.
Clik here to view.

Hack Naked TV Episode 25

In this episode we talk about shoes.. And the people who have weird alligator shoe hangups. We also talk about insider attacks and more Offensive Countermeasures goodness. Links for this Episode:...

View Article

Image may be NSFW.
Clik here to view.

Who Would Want to Take Down the Internet?

This is a question I often ask in response to those sounding the alarm that “hackers” can take down the Internet and that we all should be very worried. This is a warning I’ve seen consistently for...

View Article


Image may be NSFW.
Clik here to view.

Canadian resident sentenced to death for writing a computer program

A Canadian resident has been sentenced to death in Iran for offending the faith, after his computer program was used without his knowledge to upload pornography.

View Article

Image may be NSFW.
Clik here to view.

Fluke Rolls Out New Threat Signatures Released To Protect Against Wireless...

New signatures protect against four attacks that can exploit wireless LANs

View Article


Image may be NSFW.
Clik here to view.

Lightsaber To The Knee

via the always erudite TechnaBob at technabob.com

View Article

Image may be NSFW.
Clik here to view.

Week 3 in Review – 2012

Event Related Infiltrate  Conference “Voight-Kampff’ing The BlackBerry PlayBook” at INFILTRATE 2012 – intrepidusgroup.com We gave a talk at Immunity’s awesome INFILTRATE conference in Miami Beach, FL....

View Article


Image may be NSFW.
Clik here to view.

Facebook scam: the hours I spend…

I tend not to try to compete with sites like Facecrooks that specialize in tracking malware issues: however, they've just flagged a scam that has apparently already tricked arund 300,000 Facebook users...

View Article

Image may be NSFW.
Clik here to view.

Eurotrash episode 28

Episode 28: The Wimster

View Article

Image may be NSFW.
Clik here to view.

Judge rules decryption can be forced

The U.S. Constitution's Fifth Amendment states no one can be "compelled in any criminal case to be a witness against himself". Yet Judge Robert Blackburn has ruled in Colorado that courts can force...

View Article
Browsing all 37364 articles
Browse latest View live