#TWContest: The 7th most popular password is…
On Friday we posted our third question of the Trustwave 2012 Global Security Report Twitter Contest.The question was…“What was the 7th most popular password found during a Business Password Analysis of...
View ArticleThe Benefits of Closed Loop Development
“On January 31, Veracode released our first platform update of 2012, including new scans for iOS, improved eLearning progress tracking and reporting, additional API methods, and better communication of...
View ArticleReal-time Enterprise Exploitability Trending
Penetration tests are typically a point-in-time exercise to determine if a remote adversary or malicious insider can compromise systems that contain sensitive data. Most organizations do not conduct...
View ArticleTicketmaster warns of hacked mailing list, Adobe Reader spams sent out
The UK branch of the ticketing firm Ticketmaster has warned its online customers that they might have received a series of unauthorised emails after its TicketWeb subsidiary's mailing list system was...
View ArticleGhosts of Futures Past
image via The Syracuse Herald, September 2, 1930 via Paleofuture, comes this superb hsitorical thought peice on the Amercia Federation of Musicians efforts to fight prerecroded music in motion...
View ArticleBeware of spam this Valentine’s Day
Looking forward to Valentine's Day? Need a last minute present? Don't let spammers take advantage of you.
View ArticleMinimizing the SaaS Security Risk
In many enterprises, the use of software-as-a-service (SaaS) applications is spinning out of control, yet most companies don't know what to do about it, given the fact that the consumerization of IT...
View ArticleWhy is residual risk so important?
ShareTerm ‘residual risk’ is mandatory in the risk management process according to ISO 27001, but is unfortunately very often used without appreciating the real meaning of the concept. What is...
View ArticleNitrozac and Snaggy: Rejected Tom Swift Jr. Novels
via the astoniishing genius of Snaggy and Notrozac at The Joy of Tech™
View ArticleWeek 6 in Review – 2012
Event Related ShmooCon Firetalks 2012 ShmooCon Firetalks 2012 – irongeek.com These are the videos I have for the ShmooCon Firetalks 2012. ShmooCon Epilogue 2012 – irongeek.com These are the videos I...
View ArticleConsidering PII as “Potential” Information on unique Identity
With all the conversations about Google and their privacy policy changes, as well as the ongoing conversation about how much risk the Zappos breach really offers; the concept of PII seems like a...
View ArticleA Temporary New Look
The web site now sports an incomplete custom theme. My earlier theme was rendered obsolete by a Drupal upgrade. And that was atop unexpected down time: the upgrade process went poorly and I had to...
View ArticleDisaster Recovery for VMware View and vCloud Director
Chris Colotti has written detailed instructions on vCloud Director Disaster Recovery Creating DR solutions for vCloud Director poses multiple challenges. These challenges all have a common theme. That...
View ArticleCookie-stuffing click-jackers rip off Victoria’s Secret Valentine’s giftcard...
Thinking of going online to get a Victoria's Secret giftcard for your Valentine? Be careful where you look! Some Google search results are rigged, especially image results. And some innocent-looking...
View ArticleNokia N9 Operator Logo Hack
I've been fiddling around the file system of the Nokia N9 lately. It's not hard to do and actually quite fun to have shell on a linux device that fits in the palm of your hand. First you enable...
View Article350,000 users exposed by hardcore porn hack
A hacker claims to have stolen information from 350,000 users of Brazzers, a hardcore production company based in North America, to highlight a security vulnerability.
View ArticleNew IBM iSeries Audit Policy
A new configuration auditing policy designed to test IBM Systems against the iSeries Security Reference Version 5 Release 4 is now available on the Tenable Support Portal. Users can log into the...
View ArticleWikileaks to go mobile (Not an app)
The Sealand platform that was home to the data haven HavenCo.The infamous site Wikileaks is looking to move itsoperations to a boat in international waters! Holy shades of Snow Crash! Theboat idea is...
View ArticleSecurity is Like Insurance
Security is Like Insurance We all know that the cost of insurance is just part of life, even if you never have a lawsuit or a fire. You buy insurance to help cover your losses when bad things happen....
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View Article