SecuraBit Episode 98: Adapting to Our Internet!
Please join us as we talk about cybercrime, botnets, and the ever changing internet with special guest Brian Krebs! Our show notes are now on our wiki: http://wiki.securabit.com/ShowNotes/EP98
View ArticleBehind the Scenes at RSA
Plug in to this blog series to get a behind-the-scenes look at the world's largest technology security conference. MORE > Click the title to read the full article.
View ArticleBrowser Wars: The Certificate Menace
As we had predicted ("Trend #9: SSL Gets Hit in the Crossfire) SSL infrastructure is drawing a lot of attention this year. Google researcher Adam Langley says that Google is planning on disabling...
View ArticleVIPRE Report for January 2012 Released
Social engineering ploys doesn’t grow old—probably never will considering how effective they are no matter how simple. More often than not, online criminals doesn’t have to change their tactics to get...
View Article迎来一场速度之战
注:前些时候接受了一个《计算机产品与流通》杂志的采访,采访后报道的题目定为“迎来一场速度之战”,转贴如下。请各位朋友指正。原文链接: http://www.spn.com.cn/post/t-1_t2-8_nid-409697.html 要谈安全市场的发展趋势,就必须回顾国内安全市场的发展历史。一个业界共识是,中国的安全市场发展大约从2000年起步,至今历经11年,这个过程中主要经历了四个发展时期。...
View ArticleThe Patchwork Cloud – Cross-border sovereignty issues in the cloud
One thing I've recently been made painfully aware of is sovereignty issues when it comes to cloud computing. I'm specifically referring to a situation where a consumer organization - let's say for the...
View ArticleGoogle’s privacy policy strikes a freedom chord among Netizens
There is much cry over the new Privacy Policy that Google has announced in the United States. Two issues at the center of the privacy storm, are the ability to “opt out” which essentially involves...
View ArticleFor a moment there, I thought this was today’s Google Doodle…
For a moment there, I thought this was today's Google Doodle...doodle.jpg
View Article#ITBW: iPad 3: Release date, bigger battery, retina, but no quad-core. In IT...
#ITBW: iPad 3: Release date, bigger battery, retina, but no quad-core.In IT Blogwatch, bloggers corral the rumors...$AAPLiPad 3: Release date, bigger battery, retina, but no quad-coreThe iPad 3 release...
View ArticleIs Digital Pearl Harbor THE most tasteless term in IT security?
Can hackers really cause as much bloodshed as 353 Imperial Japanese Navy fighters, bombers and torpedo planes launched from six aircraft carriers? Can hackers really kill 2,402 U.S. citizens, leave...
View ArticleEpisode 277 with Adam Shostack tonight at 6PM ET
Episode 277 of PaulDotCom Security Weekly will take us back to school with one of the authors of the The New School of Information Security, Adam Shostack. Come participate in our IRC channel or sit...
View ArticleSBN Sponsor Post
Share your best advice with us – tell us the best advice you’ve ever received, heard or given.http://bit.ly/xbdT9q
View ArticleI call shenanigans. If Coogan was really ‘determined’ and if it ‘has never...
I call shenanigans. If Coogan was really 'determined' and if it 'has never been about the money' then he wouldn't have settled in private. Instead, he would have dragged News Corp through the...
View ArticleThe Sad Story of Mr. Fails!
As you know, we love Security Testing! But there is a whole other world of software testing out there – functional, black box, white box, integration, unit, you know what I mean… One of my favorite...
View ArticleSecurity: ur doin it rong.
As I mentioned before, a lot of security work consists of telling people they're doing something wrong. There are all the "thou shalt nots" in security policies, there's the "scanning and scolding" of...
View ArticleIt all started with a Pillow Fight….
At least the friendships did, and through the conversations over on the BSides threads that have been going on for sometime now, the direction has changed to history. Even though there has been much...
View ArticleM-unition 2.0: Changes on the Horizon
With the new year comes some exciting changes for MANDIANT’s M-unition blog. We began the blog back in 2008 to share interesting research, new tools and new ideas. But we’ve seen the industry (and the...
View ArticleBetter Business Bureau malware attack spammed out
Have you received an email claiming to come from the Better Business Bureau (BBB) today? If you did, be careful.
View ArticleTop Blog Posts of 2011
Behind on your blog reading? Here's a list of our top blog posts from 2011: 1. Why Small Businesses Need to Think Like Cyber Criminals 2. IPv6: A New Version of Bigness 3. Rethinking BlackHat:...
View ArticleMy notes on Intel’s Transactional Memory (it’s like a cmpxchg64b)
People are excited that Intel is adding "transactional memory" aka "TSX" features in 2013. Ars Technica has an article here, but it feels like gobbledeegook to me. I'm not sure I can provide a less...
View Article