How do you eat an elephant?
If we were hoping for news related to breaches to slow down now that we were out of 2012, it looks like we’re already out of luck, even though we aren’t out of January. Seeing Symantec and Zappos in...
View ArticleThe spam cloud: ep01
If you were to summarize 7.2 million spam subjects from a single day into a tag cloud – what would it look like? er… like this! As you can see the main products being pushed today are fake watches,...
View ArticleNitrozac and Snaggy: Co-Ex-Co-CEOs
via the genius of Nitrozac and Snaggy at The Joy of Tech™
View ArticleCheck Point Life Cycle
Check Point Life Cycle by Toby Deemer How to Read and Search the Support Life Cycle Documentation This series of links can help you plan for a Check Point implementation, as well as an upgrade or...
View Article‘The next iPhone isn’t the iPhone 5!’ (reader mailbag) … #tlv $AAPL
'The next iPhone isn't the iPhone 5!' (reader mailbag)...#tlv $AAPL'The next iPhone isn't the iPhone 5!' (reader mailbag)Hey people, help me out here. What's your reaction to this reader's comment? How...
View ArticleNew Epsilon CISO Takes A Close Look At Security Team, Processes
Less than a year off of a massive data security breach, Epsilon Data Management LLC has hired new security and IT leadership with the hopes of addressing its security lapses and boosting its tarnished...
View ArticleSBN Sponsor Post
RSA Conference US 2012 keynote lineup announced. Tony Blair to give closing keynote address.http://bit.ly/wrm3Aw
View ArticleGoogle Privacy Policy To Be Revised
This morning I woke up to read that Google will revise their privacy policy in order to bring roughly 60 services under one banner. From Google: We’re getting rid of over 60 different privacy policies...
View ArticleJailbreaking with Absinthe
It seems to have been my week for commenting on Apple jailbreaking issues: Quoted by Kevin Townsend in two articles: Absinthe – jailbreaking the Apple 4S on his own blog, for Infosecurity Magazine on...
View ArticleImplementing DLP- Getting Started
In our https://securosis.com/blog/implementing-and-managing-a-dlp-solution we started describing the DLP implementation process. Now it’s time to put the pedal to the metal and start cranking through...
View ArticleO2 Oops: Exploitable Privacy Flaw
via ThinkBroadband’s Sebastien Lahtinen, comes this well-crafted litany of research by Lewis Peckover providing evidence of data leakage on Europe’s O2 Wireless Network (LSE: OOM). Whereby device...
View ArticleFree Webinar Tomorrow: Securing VoIP and Unified Communications Systems
Want to join in to a free webinar/webcast to learn about VoIP and Unified Communications security? Tomorrow, Thursday, January 26, 2012, I (Dan York) will be speaking as part of US Telecom’s monthly...
View ArticleFirst 2012 OWASP Belgium Chapter Meeting Wrap-Up
A new year started and why change good habits? I’m just back from the first OWASP Belgium Chapter meeting of 2012. Here is my quick wrap-up. The organization remains the same, the first few minutes...
View ArticlePossibly tomorrow’s #itbwfinally ? What do you think?
Possibly tomorrow's #itbwfinally ? What do you think?Moves Like Batman - Maroon 5 Moves Like Jagger Parodyhttp://itunes.apple.com/us/album/arkham-city-song-moves-like/id476859267 Moves Like Batman -...
View ArticleSymantec: Stop using pcAnywhere, right now
Symantec has admitted that blueprints for current versions of its pcAnywhere software were stolen in 2006 and that all users are at risk of attack and should pull the plug.
View ArticleGAO Report: Information Security Breaches
Short (mercifully), yet informative C-SPAN video, this time with Greg Wilshusen, Director, Information Security Issues, within the United States Government Accountability Office’s (GAO). In which,...
View ArticleVideo Cameras in Boardrooms
Seems like connecting to video cameras on the Internet has been a thing to do for about a decade now. The classic example was to use a search engine to identify the cameras by their URL:...
View ArticleAnnouncing the Marriage of Technical and Traditional Security Skills
RSA recently published the SBIC report entitled ‘Getting Ahead of Advanced Threats’. One of the recommendations from the report is about finding the right people with the right skills to become Cyber...
View ArticleInfoSec Daily Podcast Episode 577
Episode 577 - Pentest Lessons, Kelihos, O2mo, Privacy Backlash, Hiding Bad Reviews & DNS Changer Change Back
View Article