Watchdog Group Files Lawsuit to Stop Google’s New Privacy Policy
The non-profit privacy organization known as EPIC (Electronic Privacy Information Center) filed a lawsuit in the U.S. District Court for the District of Columbia Feb. 9, 2012, against the Federal Trade...
View ArticleIdle Hands are the Devil’s Tools – Support in a Post-UGC World
Idle Hands are the Devil’s Tools Support in a Post-UGC World by Jared Olszko While cruising around for an answer to a configuration problem I was having this morning, I had an interesting thought....
View ArticleIs Crytographic Theory Relevant?
Videos of most of the talks from the recent Is Cryptographic Theory Relevant? workshop that was held at Cambridge University from January 31 through February 2 are now available here. I haven't had a...
View ArticleScareware Doesn’t Scare Me
Most consumers know what a virus or a Trojan is, but if you threw the word “scareware” at them, you might get a look as though you were an alien from another planet. Scareware is no different than any...
View ArticleAvast! Free Mobile Security Contest results.
Since you asked for avast! Free Mobile Security (for Android) and we gave it to you, we wanted to celebrate its launch with our Community. Thus, from December 22, 2011 to January 22, 2012 we offered a...
View ArticleHack Naked TV Episode 27
In this edition we talk about Finger Zombies, Security Architecture, and the Foxconn attack. Links for this Episode: TrustWave.. WTH? UAC Fun FoxConn Hacked Offensive Countermeasures in Orlando! Video...
View ArticleShould having autism be a legal defence to hacking charges?
Gary McKinnon and Ryan Cleary have raised the profile of hackers with autism. With yesterday marking the 10th Anniversary of Gary McKinnon's arrest, and with charges still hanging over his head, how...
View ArticleGoogle Wallet Found Vulnerable
News, of vulnerabilities within the highly touted, and equally claimed-as-secure Google Inc. (NasdaqGS: GOOG) Wallet PIN. Evidently, the Mountain View, CA based search leviathan, in their over-arching...
View ArticleLive Webcast: Reduce your IDM Operating Costs Using IDaaS
Time and time again, we hear from organizations that are struggling with the task of managing their IAM deployments. Budget overruns and unexpected expenses, the difficulty of finding and retaining IAM...
View ArticleOnline Dating Advice for the Lovelorn
Dear Miss Deborah, Three months ago, I started chatting with a guy I met online, and we really hit it off – we have so much in common! He looks quite handsome in the photos he sent. He sent me flowers...
View ArticleRewind And Replay For Web App Vulnerabilities
Security threats develop and evolve with startling rapidity, with the attackers always seeking to stay one step ahead of the S&R professional.read more
View Article#TWContest: The industry that ranked third is…
On Thursday we posted our first question of the Trustwave 2012 Global Security Report Twitter Contest.The question was…“Which industry ranked third in total number of breaches investigated by...
View ArticleControlScan Launches ProTect Managed Security Services
Service improves the security of websites and Web applications
View ArticleGoogle Wallet Toots Two Security Flaws
This week, two different security researchers discovered two serious security flaws with the payment system. The first weakness pertains to the Google Wallet PIN protection system that allows access to...
View ArticleSucuri SiteCheck – Web Malware Distribution – January 2012
As many know, we have been offering our free website malware scanner – Sucuri SiteCheck, since early in 2011. In our commitment to continue to give back to the community, we want to share some...
View ArticleACTA and TPP: The wrong approach to intellectual property protection
This weekend there will be street protests in Europe against ACTA, the Anti-Counterfeiting Trade Agreement. I want to put on record ESET North America’s opposition to ratification of this agreement...
View Article