Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

#TWContest: The 7th most popular password is…

On Friday we posted our third question of the Trustwave 2012 Global Security Report Twitter Contest.The question was…“What was the 7th most popular password found during a Business Password Analysis of...

View Article


Image may be NSFW.
Clik here to view.

The Benefits of Closed Loop Development

“On January 31, Veracode released our first platform update of 2012, including new scans for iOS, improved eLearning progress tracking and reporting, additional API methods, and better communication of...

View Article


Image may be NSFW.
Clik here to view.

Real-time Enterprise Exploitability Trending

Penetration tests are typically a point-in-time exercise to determine if a remote adversary or malicious insider can compromise systems that contain sensitive data. Most organizations do not conduct...

View Article

Image may be NSFW.
Clik here to view.

Ticketmaster warns of hacked mailing list, Adobe Reader spams sent out

The UK branch of the ticketing firm Ticketmaster has warned its online customers that they might have received a series of unauthorised emails after its TicketWeb subsidiary's mailing list system was...

View Article

Image may be NSFW.
Clik here to view.

Ghosts of Futures Past

  image via The Syracuse Herald, September 2, 1930       via Paleofuture, comes this superb hsitorical thought peice on the Amercia Federation of Musicians efforts to fight prerecroded music in motion...

View Article


Image may be NSFW.
Clik here to view.

Beware of spam this Valentine’s Day

Looking forward to Valentine's Day? Need a last minute present? Don't let spammers take advantage of you.

View Article

Image may be NSFW.
Clik here to view.

Minimizing the SaaS Security Risk

In many enterprises, the use of software-as-a-service (SaaS) applications is spinning out of control, yet most companies don't know what to do about it, given the fact that the consumerization of IT...

View Article

Image may be NSFW.
Clik here to view.

Why is residual risk so important?

ShareTerm ‘residual risk’ is mandatory in the risk management process according to ISO 27001, but is unfortunately very often used without appreciating the real meaning of the concept. What is...

View Article


Image may be NSFW.
Clik here to view.

Nitrozac and Snaggy: Rejected Tom Swift Jr. Novels

via the astoniishing genius of Snaggy and Notrozac at The Joy of Tech™

View Article


Image may be NSFW.
Clik here to view.

Week 6 in Review – 2012

Event Related ShmooCon Firetalks 2012 ShmooCon Firetalks 2012 – irongeek.com These are the videos I have for the ShmooCon Firetalks 2012. ShmooCon Epilogue 2012 – irongeek.com These are the videos I...

View Article

Image may be NSFW.
Clik here to view.

Considering PII as “Potential” Information on unique Identity

With all the conversations about Google and their privacy policy changes, as well as the ongoing conversation about how much risk the Zappos breach really offers; the concept of PII seems like a...

View Article

Image may be NSFW.
Clik here to view.

A Temporary New Look

The web site now sports an incomplete custom theme. My earlier theme was rendered obsolete by a Drupal upgrade.   And that was atop unexpected down time: the upgrade process went poorly and I had to...

View Article

Image may be NSFW.
Clik here to view.

Disaster Recovery for VMware View and vCloud Director

Chris Colotti has written detailed instructions on vCloud Director Disaster Recovery Creating DR solutions for vCloud Director poses multiple challenges. These challenges all have a common theme. That...

View Article


Image may be NSFW.
Clik here to view.

Cookie-stuffing click-jackers rip off Victoria’s Secret Valentine’s giftcard...

Thinking of going online to get a Victoria's Secret giftcard for your Valentine? Be careful where you look! Some Google search results are rigged, especially image results. And some innocent-looking...

View Article

Image may be NSFW.
Clik here to view.

Nokia N9 Operator Logo Hack

I've been fiddling around the file system of the Nokia N9 lately. It's not hard to do and actually quite fun to have shell on a linux device that fits in the palm of your hand. First you enable...

View Article


Image may be NSFW.
Clik here to view.

350,000 users exposed by hardcore porn hack

A hacker claims to have stolen information from 350,000 users of Brazzers, a hardcore production company based in North America, to highlight a security vulnerability.

View Article

Image may be NSFW.
Clik here to view.

New IBM iSeries Audit Policy

A new configuration auditing policy designed to test IBM Systems against the iSeries Security Reference Version 5 Release 4 is now available on the Tenable Support Portal. Users can log into the...

View Article


Image may be NSFW.
Clik here to view.

Wikileaks to go mobile (Not an app)

The Sealand platform that was home to the data haven HavenCo.The infamous site Wikileaks is looking to move itsoperations to a boat in international waters! Holy shades of Snow Crash! Theboat idea is...

View Article

Image may be NSFW.
Clik here to view.

Security is Like Insurance

Security is Like Insurance We all know that the cost of insurance is just part of life, even if you never have a lawsuit or a fire. You buy insurance to help cover your losses when bad things happen....

View Article

Image may be NSFW.
Clik here to view.

SBN Sponsor Post

Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l

View Article
Browsing all 37364 articles
Browse latest View live