Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Sophos Reveals Assessment On Threat Landscape In Security Threat Report 2012

2011 was characterized by a rise in cybercrime

View Article


Image may be NSFW.
Clik here to view.

Dome9 Unveils Industry First Multi-Cloud Security Groups

Functionality consolidates security management across multiple cloud servers

View Article


Image may be NSFW.
Clik here to view.

Mobile Marketing Association Releases Final Privacy Policy Guidelines For...

Guidelines addresses the core privacy issues and data processes of many mobile applications

View Article

Image may be NSFW.
Clik here to view.

Implementing Message Record Management Exch 2010

I was recently working on a project that involved creating some Retention policies for our Exchange 2010 sp1 environment. The project got a bit scary in the testing phase when we realized that the...

View Article

Image may be NSFW.
Clik here to view.

entrepreneur.com compromised with CrimePack

Today, Websense® ThreatSeeker® Network alerted us that entrepreneur.com has been compromised by cyber criminals, resulting in potentially malicious content being downloaded to a user's machine....

View Article


Image may be NSFW.
Clik here to view.

Perspective on the EU Data Privacy Proposal

The EU has come out with a data protection proposal. First, the good stuff: The new EU privacy law takes a good step forward for privacy. The ability to control and even delete individual data profiles...

View Article

Image may be NSFW.
Clik here to view.

Sophos Security Threat Report 2012 – seeing through the hype

We know you're probably sceptical of "state of the world" reports from vendors. For all you can tell, they'll turn out to be thinly-digsuised advertorial, unreconstructed product brochures, or worse....

View Article

Image may be NSFW.
Clik here to view.

Report: Hackers Breach Northwest Railway Systems by Disrupting Signal System

In yet another dangerous escalation of hackers sabotaging infrastructure, an alleged attack from overseas disrupted service on three unnamed Pacific Northwest railway lines. In the attack, the hackers...

View Article


Image may be NSFW.
Clik here to view.

NetBIOS spoofing for attacks on browsers

Sometime ago during pentest NetBIOS protocol got my attention. Especially, NetBIOS naming and its co-work with DNS.NetBIOS is an old protocol, distributed world-wide, but it doesn’t have many security...

View Article


Image may be NSFW.
Clik here to view.

A Conversation with Richard Clarke – Part I

Following a dramatic increase in the number and severity of breaches in 2011, Chris Wysopal and internationally-renowned security expert Richard Clarke discuss the changing cyber threat environment,...

View Article

Image may be NSFW.
Clik here to view.

Reserve Your Personal 10 Minute Briefing at IAPD/IPRA with an ADT Security...

This year, The Illinois Association of Park Districts and Illinois Park and Recreation Association will once again sponsor the state’s annual Soaring to New Heights Conference from January 26-28 at the...

View Article

Image may be NSFW.
Clik here to view.

Chuck Norris is NOT dead – beware the Facebook scam!

Messages have been spread on Facebook claiming to link to a video news report of the death of awesome martial arts film star Chuck Norris.

View Article

Image may be NSFW.
Clik here to view.

World Economic Forum: Shaping New Risk Models

By Tara Savage, Senior Marketing Manager, BT Global Services Today’s business, economic, government and social climates are driven by data.  Sharing information is fundamental to how states and...

View Article


Image may be NSFW.
Clik here to view.

Master the Cloud – putting sanity into this "cloud" thing

Over the border, watch me run ...look out Canada because here I come!     If the cloud is somewhere on your radar for 2012 (and let's face it, who's radar is it not on?) and you happen to live north of...

View Article

Image may be NSFW.
Clik here to view.

Encryption Controversy Continues

As you may have heard, the controversy over whether a court can compel an individual to disclose the encryption key for an encrypted drive continues. In this latest chapter, a district court in...

View Article


Image may be NSFW.
Clik here to view.

Acunetix WVS 8 Released Candidate Now Available!

We are pleased to announce a Release Candidate (RC) of the much-awaited Acunetix Web Vulnerability Scanner, version 8. This build fixes issues that were reported during the Beta stages of development...

View Article

Image may be NSFW.
Clik here to view.

Who exploits "Brand Me"? Is customer power sufficient?

We have had much publicity for the policy changes made by Google and Facebook. This morning  l received a LinkedIn message from the former Head of Information Security of a global multinational...

View Article


Image may be NSFW.
Clik here to view.

Symbian still number one

According to the data from statcounter.com, the Symbian operating system is still more popular than the ones that we hear about in the news so much: iOS and Android. That might change in a year or so,...

View Article

Image may be NSFW.
Clik here to view.

TSA: Targeted Train Systems Hack (Maybe, Possibly – Oh, OK, We’re Just...

NextGov’s Aliya Sternstein  is reporting  a Transportation Security Admnistration [TSA] memo detailing an alleged system intrusion [attacking a Pacific Northwest rail company’s systems], and subsequent...

View Article

Image may be NSFW.
Clik here to view.

Top 5 Tips To Make Social Engineering Your Career

Chris Hadnagy Over the last year social engineering has gotten a lot of press. From the attacks on companies like Sony, HB Gary, PBS, Citibank et al to contests like the Social Engineering CTF at...

View Article
Browsing all 37364 articles
Browse latest View live