Safer Internet Day 2012
Did you now that… 26% of children report having a public social networking profile 12% of European 9-16 year olds say they have been bothered or upset by something on the Internet …however, 56% of...
View ArticleFor the Armed Forces, Privacy Has Become a Gut Issue
If there ever was a slippery slope to worry about, here’s a beaut: DARPA (the Defense Advanced Research Project Agency) is working on implantable bio sensors for the Armed Forces that will tell the...
View ArticleLoans made by banks
Since lots of Voltage's customers are large banks, we need to understand the business of banking to understand what our customers need. Because of this, I periodically look at the data that the US...
View ArticleIs The Market Ready For A Phablet? – +Forbes
Is The Market Ready For A Phablet? - +ForbesIs The Market Ready For A Phablet? - ForbesThe benefit of a phablet (a cross between a phone and a tablet) is that it can still fit in a pocket, one of the...
View ArticleAgreeing with Anonymous?
The news of the latest Anonymous hack has me vexed. Here's an clip from SCMagazine on their latest hack:"Just hours after releasing the recording of its daring interception of an FBI-Scotland Yard...
View ArticleDoD Cyber Crime Conference Presentation: Recipes for Remediation
Wendi Rafferty and I presented at the DoD Cyber Crime conference in Atlanta, GA. Our presentation, “Recipes for Remediation: Key Ingredients for Building a More Resilient Security Program,” has been...
View ArticleFBI Gets Bitten by Operational Security
At corporations and government offices around the world a security failure happens every day. Employees forward confidential calendar events and messages to personal calendars and personal email...
View ArticleGaussian Processes, Implicit Likelihoods
Ladies and gentlemen, girls and boys, submitted for your approval: The singular Murali Haran. Ph.D., of Pennsylvania State University’s Department of Statistics presentation. Whence, the good Doctor...
View ArticleFour Keys for IP Protection
Do you think data breaches are up or down in 2011 compared to 2007 or 2008? The official answer may surprise you. According to DatalossDB and the 2011 Data Breach Investigations Report by Verizon, the...
View ArticleMiss Piggy gives her views on phone hacking scandal
At a press conference promoting the new Muppets movie, Kermit the frog declined to comment on the high profile allegations of the media breaking into the mobile phone voicemail systems.
View ArticleTanner and Cassels: Geordi’s Visor
Comic by Caldwell Tanner and Patrick Cassels, via Set Phasers To LOL, Follow Caldwell on Twitter.
View ArticleTimes Editor apologises for NightJack email hacking
The editor of The Times has apologised, after he admitted a journalist had hacked into a serving police officer's email account.
View ArticleWhy is a 14-month-old patched Microsoft vulnerability still being exploited?
While the media just looove zero-day exploits, the security industry sees a lot more exploits designed to take advantage of patched vulnerabilities. Question is why don't many of us get around to...
View ArticlePhishing Financial Institutions & Social Networks
Phishing is a method of credential theft that tricks Internet users into revealing sensitive information, such as personal or financial information, online. Phishers use phony websites or deceptive...
View ArticleTrendnet home security cam flaw exposes video feeds on net
BBC reports, Feeds from thousands of Trendnet home security cameras have been breached, allowing any web user to access live footage without needing a password. Internet addresses which link to the...
View ArticleSpeaking at RSA
I’ll be moderating a panel at RSA on Monday, Feb 27 between 12:30 and 1:40, session PROF-001. The topic is a continuation of the work we have done in the past year on Stress and Burnout in the...
View Article(MS09-062) GDI+ .Net PropertyItem Heap Overflow Vulnerability (957488)
(MS09-062) GDI+ .Net PropertyItem Heap Overflow Vulnerability (957488)
View ArticleSBN Sponsor Post
Share your best advice with us – tell us the best advice you’ve ever received, heard or given.http://bit.ly/xbdT9q
View ArticleMicrosoft Windows DLL Load Hijacking (2269637)
Microsoft Windows DLL Load Hijacking (2269637)
View ArticleForcing Flash to Play in the Sandbox
Adobe has released a public beta version of its Flash Player software for Firefox that forces the program to run in a heightened security mode or “sandbox” designed to block attacks that target...
View Article