Weekly News Roundup
As most of the folks who work at Veracode know, I’m brand new to the IT security space. I’ve been in start-ups most of my career and I’ve touched many industry verticals, but this is my first foray...
View ArticleIt’s Good to be No. 2!
Last Friday night, I realized a lifelong dream (no, I didn’t meet David Letterman, while I was appearing as a cast member on Saturday Night Live*)…I got to be a MASCOT! Years of stuffing myself into...
View ArticlePA-DSS Program Guide v2.0
The PA-DSS Program Guide v2.0 and Attestation of Validation (AOV) v2.01 have been released by the SSC with changes that impact the preparation of Reports of Validation (ROVs). Version 1.0 expires on...
View ArticleNew: VERT Alert Live Events!
Do you ever wish you could quickly consult a security expert right after new security bulletins are released so you can get your questions answered? Starting next week, February 14, 2012, nCircle's...
View ArticlePaulDotCom Security Weekly Episode 276
Tune in to PaulDotCom Security Weekly TV, Hack Naked TV, and Hack Naked At Night episodes on our YouTube Channel or our Bliptv channel. Joe Stewart on Malware Analysis: UPnP Hacking with Backtrack 5...
View ArticleRSA Conference Friday Five – February 10, 2012
With RSA Conference 2012 only a couple of weeks away, could a cyber risk be heating up an East-West cold war? This week’s Friday Five will delve into that question and four other burning topics from...
View Article"Only the one who dies, truly lives"
One afternoon in 1990 as I rode in a dusty, bumpy bus over the Himalayas an elderly man told me extracts from his life story. He had rented a scooter in the early 1950s and rode the 10,000 km from...
View ArticleAnatomy of a Crimeware Syndicate, Part II
Part two of our three part series Anatomy of a Crimeware Syndicate. In part one we talked about the hierarchy and operations of a crimeware syndicate. Today we’re going to talk about the threat...
View ArticleAddress Bookery: The Failure of Mobile Device Data Security
via Gruber, and originally via Dustin Curtis, comes this plaintive post for iron-cladding the Address Book in iOS 5. Astoundingly, nearly all iOS applications can read the Address Book, and, if...
View ArticleBeacon Podcast – Episode 016
Hurricane Labs Beacon Podcast Episode Number: .016 – Somebody’s Watching Me Edition Hosts: Bill Mathews (@billford), Matt Yonchak (@mattyonchak), Patrick Sayler (@psayler), Josh Evans (@jsevans59...
View ArticleTime for a New Look
I’m maintaining this blog for a while now. For a long time I’ve decided to give it a new look. I’m not web designer/developer, so I searched across the multiple WordPress themes freely available....
View ArticleInfoSec Daily Podcast Episode 591
Episode 591 - Revoked Yet Still Resolvable, Assad, FTC, TrustWave & Blackbox Friday
View ArticleSBN Sponsor Post
Share your best advice with us – tell us the best advice you’ve ever received, heard or given.http://bit.ly/xbdT9q
View ArticleDutch ISP KPN hacked, credentials and personal information leaked
Dutch ISP KPN had over 500 of its customers personal information posted online after being hacked late last month. The data included names, addresses, passwords and telephone numbers.
View ArticleMonitoring Cloud Availability with Twitter
Ah, remember how text alerts would go to our pagers and how cool it was to wake up at all hours of the night and have to sleep-shell into servers for emergency maintenance? Yeah, blowing up a pager is...
View ArticleCIA website brought down – were Anonymous attackers responsible?
The CIA's website was brought down for some hours last night by what appears to have been an internet distributed denial-of-service (DDoS) attack.
View ArticleSBN Sponsor Post
RSA Conference US 2012 keynote lineup announced. Tony Blair to give closing keynote address.http://bit.ly/wrm3Aw
View ArticleA Rant About Hacking Labs
By Thomas Wilhelm, ISSMP, CISSP, SCSECA, SCNA One of the more frequent questions I see on EH-Net pertains to creating pentest labs. Individuals new to the topic of hacking often have a limited...
View ArticleAssad’s Leakage
The Two Evils:, Assad Is The Skinny One On The LeftIt Depends on whom you speak with, but apparently, concomitant with the proverbial Blood on His Hands, comes Email Leakage in the Assad regime. Why is...
View Article