Weekly Roundup : Jan 27, 2012 : Twitter Announces Censorship Policy for...
Trending Security News The week ended with some ruffled feathers as Twitter announced it would allow some content in certain countries to be censored. The New York Times headlined its coverage as “...
View ArticleTop 3 Data Security Tips in Celebration of Data Privacy Day
As we conduct business in an increasingly cloudy, mobile, and social world, it’s more important now than ever to take data security and privacy into consideration. Data is everywhere and its value is...
View ArticleGates’ Pledge to Fight Virus
Here's some hopeful news from Bill Gates. Viral illness is in decline thanks to his focused attention and heaps of money spent on the reduction of suffering. …the Microsoft founder has become the...
View Article15 Categories that constitute Cybercrime
It is acknowledged that there is no comprehensive definition for Cybercrime. Definitions vary, as cybercrime is a new and rapidly evolving theme. Cybercrimes are crimes that a) are targeted against a...
View ArticleRisk Management
A short illustration of risk management. Demonstrating the concepts of risk mitigation, acceptance, avoidance and transfer. Learn these concepts well and you’ll do well in your CISSP exam.
View ArticleMassive Virus Hits Android
According to this article: a bug by the name of Android.Counterclank has infected between 1 million and 5 million Android users as of this afternoon. This incident points out the problem of having a...
View ArticleShmoocon 2012
Your intrepid reporter coming to you from Shmoocon… It’s another fabulous year enduring the (thankfully liquid precipitation) SHMOOPOCALYPSE in ¿sunny? Washington DC. The Shmoo Group has again put on a...
View ArticleDOD: Android on SIPRNet
News, of the United States Department of Defense’s [DOD] apparent acceptance of Google Inc. (NasdaqGS: GOOG) Android operating system based devices on the DOD SIPRNet network. The National Institute...
View ArticleDry Bones: Proliferation
via the political cartoon genius of Y. Kirschen at drybonesblog.blogspot.com
View ArticleShmooCon 2012: Java backdoors and Cross Framework Abuse
Java backdoors and Cross Framework Abuse – Nicholas (aricon) Berthaume Adding backdoor(s) Java has a number of different archive formats. This talk covers the J2SE / J2EE type archives. The goal here...
View ArticleShmooCon 2012: Raising The White Flag
Raising The White Flag :: Bypassing Application White Listing – Curt Shaffer and Chris Cuevas More and more people are seeing application whitelisting in their environments. Despite what marketing...
View ArticleSBN Sponsor Post
Attend the RSA Conference webcast .Using Online Advertising to Find Out if Your Data is Valuable to a Criminal. on January 25th.http://bit.ly/sGUunJ
View ArticleSecurity BSides San Francisco, and RSA conference
I thought we were making progress last year, but I may have been mistaken. The RSA Conference is enforcing the non-compete clause in their sponsor and exhibitor agreements, that means a written waiver...
View ArticleRooted: Linux Privilege Escalation
News, of significant flaws in the latest Linux Kernel, of which, lead to an ordinary user privilege escalation of rather enormous implications, the holy grail of operating system attacks: Root. The...
View ArticleGPS Tracking: An Invasion of Privacy?
The Supreme Court's unanimous decision in the United States v. Jones GPS tracking case has been hailed as a victory by privacy rights advocates. Indeed, the fact that both sides of the ideological...
View ArticleSBN Sponsor Post
RSA Conference US 2012 keynote lineup announced. Tony Blair to give closing keynote address.http://bit.ly/wrm3Aw
View ArticleOceanic Interspecies Communications + Play
via BoingBoing’s Maggie Koerth-Baker, comes this fascinating study on dolphin / whale interspecies communications and play (originally via Charles Q. Choi). Superb. ⩹
View Article