In N. Korea, use a cellphone and die. In IT Blogwatch, bloggers assume ‘war...
In N. Korea, use a cellphone and die.In IT Blogwatch, bloggers assume 'war crime' means they'll be executed#itbwIn N. Korea, use a cellphone and dieNorth Koreans found using cellphones are guilty of...
View ArticleThe PCI Council’s ASV Program Gets a Makeover
By Sushila Nair, Security Specialist, BT In order to be PCI compliant It is required that customers scan their networks quarterly and for their external presence to be scanned by an Authorized Scanning...
View ArticleFor those asking about the hard-core porn legal position in the UK, I found...
For those asking about the hard-core porn legal position in the UK, I found this amusing link. I'm fairly sure it's not an urban legend...Mull of Kintyre test - Wikipedia, the free encyclopediaKintyre...
View ArticleFacebook sues alleged clickjacking firm
Facebook has filed a law suit a firm who, they say, bombarded users with clickjacking scams that earned them $1.2 million a month.
View ArticleThus spoke the Beninese: scammers hijacking Facebook chat
Wasn’t it to my surprise when a friend’s son hit me up yesterday on Facebook chat. We don’t usually chat so I was curious as to what was going on. Although he 1st asked how I was, he quickly said he...
View ArticleFBI Wants Social Network Monitoring App for Early Warning
The FBI is in the market for a system that can turn data scraped from social media and news sites into useful anti-terrorist and criminal intelligence. It wants information about domestic and global...
View ArticleSBN Sponsor Post
RSA Conference US 2012 keynote lineup announced. Tony Blair to give closing keynote address.http://bit.ly/wrm3Aw
View ArticleLOL. Met Office issues ‘yellow snow’ warning? #youcouldnotmakeitup
LOL. Met Office issues 'yellow snow' warning? #youcouldnotmakeitupMet Office: UK: severe weather warnings
View ArticleA little less than 12h left to submit your paper to #EuroSec 2012 #workshop! …
A little less than 12h left to submit your paper to #EuroSec 2012 #workshop! Deadline: Friday 27 Jan 2012 23:59:59 GMT
View ArticleCarberp Malware a Dangerous New Threat to Financial Information
Carberp, not a pretty name but a fitting one for an ugly little piece of malware, is now popping up dangerously in computers around the world. This week it attacked Facebook users in Europe and was...
View Article#7 Nessus Versus Malware – Top Ten Things You Didn’t Know About Nessus
Nessus has several different plugins and techniques for helping you with the fight against malware. The video below is part 7 in our series of the top ten things you didn't know about Nessus and...
View ArticleFinding pcAnywhere in your Organization
Symantec announced that hackers have had the source code for remote access software pcAnywhere since 2006. It can’t be trusted until they issue a patch. Some organizations may be anxious to see how...
View ArticleShmooCon Begins with LobbyCon
ShmooCon officially kicks off today Friday January 27, 2012, but yesterday was LobbyCon at the Hilton Hotel at 1919 Connecticut Ave, NW in Washington, DC. The Lobby became a mini conference where...
View ArticlePersonal Data Websites Collects Online
Google recently released its new Privacy Policy which explains what information it collects and its use in simple terms. It is important for each cybercitizen to fully understand the extent of...
View ArticleEx-Spy Chief: It May Take a Crisis for Lawmakers to Get Serious About...
According to a former top U.S. intelligence official, it may take a cyber-calamity to spur the United States to get serious about cybersecurity, including getting the U.S. government and businesses to...
View ArticleHow Time Warner Profits from Anonymous
This is entertaining. The gist: [Anonymous'] disguise is earning big bucks for a major media conglomerate. Warner Brothers, the Time Warner subsidiary who produced the movie, owns the rights to the Guy...
View ArticleFight Club Rules for ShmooCon 2012
Yes, the day is finally upon us … ShmooCon there will be! I’ve been lucky enough to attend the past five or six years of this awesome conference. You could almost call me a veteran attendee … and as...
View ArticleExploring 2012 Data Privacy Threats: Part 2 of 3
This is part two in a series of three on data privacy. Read Pat’s first interview here. Are we desensitized to hack attacks despite the headline-making stories featuring Anonymous last year? What can...
View ArticleDHS Confirms: "Attack Did Not In Fact Target A Transportation Entity"
News, of rather strong disputation, of a recently reported on memo, detailing the recent electronic attack (characterized as a cyber-attack) allegedly targeting our nation’s train system (actually a...
View Article