somethoughts12: I used to worry about encrypting all of my…
somethoughts12: I used to worry about encrypting all of my data, until I learned about rubber hose cryptanalysis. From xkcd
View ArticleBest of the week – 29 gennaio 2012
Here you can find my list of the best security resources of the week.Hope you enjoy it.First of all, the cloud section...@cuoretoro US spy agencies look to cloud computing lnkd.in/vK22iS@georgevhulme...
View ArticleSBN Sponsor Post
Register for RSA Conference US by January 27, 2012 and save $400.http://bit.ly/mRTeE4
View ArticleSecret question fail
My credit union switched to a new service provider for online banking and bill paying. The good news is that they’ve chosen a service provider that has a fairly modern looking interface, unlike the...
View ArticleThe Fantastic Flying Books of Mr. Morris Lessmore
Astonishing. If you view anything today, make this video it. Entitled, apropos, The Fantastic Flying Books of Mr. Morris Lessmore which, of course, comes to us from Moonbot Studios.
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticleTumblr Staff Blog Fakeouts Continue
Hot on the heels of the “free Starbucks giftcards” nonsense from last week comes a number of Tumblr accounts compromised and serving up “Free Southwest Airlines tickets” posts. Click to Enlarge The...
View ArticleWeek 4 in Review – 2012
Event Related Shmoocon 2012 ShmooCon 2012: Raising The White Flag – blog.c22.cc Whitelisting is often touted as a replacement for AV. Despite the fact that something better than AV is needed,...
View ArticleAustralian Taxation Office scam preys on those still awaiting refunds
The personal income tax year in Australia ends on 30 June. Many refunds will already have been processed and paid out. That hasn't stopped the scammers. They've add a few weasel-words about "delays",...
View ArticleIBM Announces New Software to Manage And Secure The Influx Of Mobile Devices...
IBM Endpoint Manager for Mobile Devices helps organizations support and protect the growing mobile workforce
View ArticleExam cheat caught using a spy pen
I found, and quite unusually so, that spy pens were heavily advertised on leading dailies and sold onboard flights in India. Spy pens can be used to make copies of documents, but with mobile phones...
View Article#ITBW: iPhone 4S lottery in Hong Kong squashes scalpers. In IT Blogwatch,...
#ITBW: iPhone 4S lottery in Hong Kong squashes scalpers.In IT Blogwatch, bloggers take a number.$AAPLiPhone 4S lottery in Hong Kong squashes scalpersWith its new iPhone 4S lottery system in Hong Kong,...
View ArticleMegaUpload data could be deleted by Thursday
According to reports, hosting companies may start deleting MegaUpload users' content from their servers as soon as Thursday - regardless of whether or not the content is legal.
View ArticleInfectious spam hijacks users who view the message
On Friday, eleven, an email security firm based in Germany, issued a warning to users to be on the lookout for spam that is taking advantage email client settings that allow messages to render HTML.
View ArticleOutdated WordPress installations hijacked by crime kits
Hundreds of websites developed with the WordPress platform were hijacked recently, and used to compromise systems leveraging a recently patched Java vulnerability. In each case, the compromised domain...
View ArticleViruses and hacking, as seen on TV and in the movies
Working in the computer security industry, we're pretty used to seeing malware and hacking misrepresented on our TV and movie screens. Here are some of our favourite examples.
View ArticleRSA Conference denies bullying B-Sides San Francisco
The RSA Conference, one of the world’s largest Information Security gatherings, is facing criticism after it failed to reach a compromise over scheduling conflicts with a smaller event.
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticleNew SCADA Plugins for Nessus and Tenable PVS
Assessing the security of SCADA devices has always been a challenging task. SCADA devices are used in several critical infrastructure industries, including power plants, manufacturing, chemical...
View ArticleHow can the growing challenges of compliance be met at affordable cost?
Part 3: Closing the loop By Paul Kearney, Chief Security Researcher, BT Innovate & Design This article continues a discussion of how to create cost-effective compliance based on a talk I gave at...
View Article