doing the shmoo
Greetings from Washington, DC – the home of corrupt politicians, sleazy lobbyists, democracy destroying SuperPACs and Moby Dick House of Kebab. I’m here to attend ShmooCon, which is (IMHO) one of the...
View Articleall your encryption passwords are belong to the cops
...but you do have to give up your passwords Interesting and depressing post from Ars Technica: A federal judge has ruled that a Colorado woman can be compelled to decrypt her encrypted laptop so that...
View ArticleOracle NoSQL
<edit>I just saw this unpublished in my drafts from last October and decided just to push it as is... a bit late now but what the heck</edit> The era of big data is upon us. I find it...
View ArticleNitrozac and Snaggy: No More Pencils, No More Books?
via the genius of Nitrozac and Snaggy at The Joy of Tech™
View ArticleCybersecurity Receives Emphasis in State of the Union Address
An interesting article by Mickey McCarter of Homeland Security Today.com about President Obama take on the cybersecurity issue in the State of the Union address. President Barack Obama called for...
View ArticleWarnings About Windows Exploit, pcAnywhere
Security experts have spotted drive-by malware attacks exploiting a critical security hole in Windows that Microsoft recently addressed with a software patch. Separately, Symantec is warning users of...
View ArticleToo Random
I was playing cards (a variant of Gin Rummy) with some people recently. When it was my turn to shuffle, I would try to do a very good job of it. I wanted the cards to be well-randomized. We all noticed...
View ArticleGaining Access to a Check Point Appliance
Gaining Access to a Check Point Appliance – Physical Access Trumps All by Tom Kopchak Recently, one of my co-workers and I were tasked with reconfiguring a Check Point Appliance for use as the main...
View ArticleSBN Sponsor Post
Register for RSA Conference US by January 27, 2012 and save $400.http://bit.ly/mRTeE4
View ArticleHOIC DDoS Analysis and Detection
In a previous blog post, we provided details of a DDoS attack tool called LOIC (Low Orbit Ion Canon) used by Anonymous in supports of denial of service attacks over the past year. Attackers are...
View ArticleShould Offering “Free Credit Monitoring Services” Absolve Data Breach...
Lately it seems as if a day doesn’t go by that we don’t hear about another data breach. And nowadays, they come in all flavors. Nefarious outsiders. Crooked insiders. Hacktivists looking to make a...
View ArticleSecurity Onion includes NetworkMiner
Doug Burks released a new ISO of his popular IDS/NSM Linux distro "Security Onion" a couple of days ago. This new ISO includes an installation of NetworkMiner straight out of the box. You can retrieve...
View ArticleA Continuous Monitoring Webinar
Jim Acquaviva and I provided a different take on continuous monitoring in a webinar last week. While lots of agencies are doing continuous monitoring of one kind or another, the subset of those...
View ArticleStraight talk on Cloud Computing from Master the Cloud, Montrèal
Check out this video in which I ambushed 2 random attendees of the Master the Cloud event in Montrèal and got them to talk to me on camera about the event. One of the fantastic things about events...
View ArticleInfoSec Daily Podcast Episode 579
Episode 579 - Dude, Where’s My Porn?, Please Pass the Tinfoil, Virus Inception: Birth of Skynet, Spamvertisement Squatnet & All Your DoD Are Belong To Us
View ArticleWhat do I do if my Twitter account is hacked?
Many Naked Security readers ask for assistance when their accounts are hacked, or when their friends, family and colleagues need assistance. This article explains the steps needed to safely reacquire...
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticleUnderway On Board USS Malkin: 11th MEU CH-53E Super Stallion
Absolutely phenomenal United States Navy Photograpy, this time, a CH-53E Super Stallion captured by Petty Officer (2nd Class) Alan Gragg. Outstanding.
View Article