There is no Place for a Kindergarten in Security
If you have children, you have for sure already faced the following situation just after they messed up. Oh, the joy of seeing them denouncing and pointing at each other with classic expressions like...
View ArticleSL33 Catamaran
Morrelli & Melvin's new catamaran is a beautiful example of modern efficiency in sailing technology and design. The crew tells me that with just 17 knots of breeze on an easy-going day they were...
View Article#HPIO: Smartphone app spyware: It’s 2002 all over again for +Esther Schindler…
#HPIO: Smartphone app spyware: It's 2002 all over againfor +Esther Schindler...Smartphone app spyware: It's 2002 all over again - Input Output Yet another smartphone app has been outed secretly copying...
View ArticleIs the era of Identity Management behind us?
From a forthcoming paper I'm working on: The era of identity management is behind us. It’s not that we don’t still need it, but there are plenty of mature solutions on the market to help organizations...
View ArticleTwitter Weekly Updates for 2012-02-13
has anyone created star systems on their childs bedroom ceiling ? what did you use ? I am attempting to be as accurate as possible…. # did anyone else wonder if in #Starwars ep IV 3d if George Lucas...
View ArticleCommon Attack Methodologies Identified in European Customers
As you may have heard, Trustwave SpiderLabs released our Global Security Report (GSR) 2012 Report, which highlights a vast amount of valuable data from our 2011 engagements. In this blog post, I want...
View ArticleTeachers’ Union Moves To Quash Wifi
Hmm. A teachers’ union moves to quash wifi in schools here in Ontario. They have come out strongly against the deployment of more wifi at Catholic schools across the province. Why you ask? Shoddy...
View ArticleData Loss Prevention – Step 7: Actionable intelligence
This is the final installment of the Data Loss Prevention (in a rational, sane way without new blinky boxes) series. In this post I'm going to bring up one of the most interesting topics (at least to...
View ArticleUN’s website still vulnerable after 4 years
More than four years ago, the UN website was hacked via SQL injection. They haven't fixed their problem since then, which I've pointed out over and over and over. This last week, #Anonymous hacked them...
View ArticleRazorback 0.4.1 released
The Razorback team has released version 0.4.1 (yeah, we would have released 0.4, but we found some critical bugs that we really needed to fix before general release). You can find the new version of...
View ArticleDirectory scam: registration for the World Trade Register’s 2012/2013
MX Lab, http://www.mxlab.eu, reported earlier in the past of directory scams to register your company “for free”. But when sending back the document, you really agree to get involved into a commitment...
View ArticleMicrosoft Store Hacked, Cracked
News, of a recent, successful hack and crack attack, this time targeting the Microsoft Store India has surfaced on The Verge; with he attackers identifying themselves as the Evil Shadow Team, a...
View ArticleDo We Need International Cyber Security Regulations?
Are we in an international cyber security arms race? Would a set of international cyber security regulations help or hinder national cyber security efforts? Listen to Episode 28 of our Security Slice...
View ArticleCryptome.org hacked into serving up Blackhole exploit kit
Secret publishing site Cryptome.org was infected over the past weekend exposing thousands of users to the Blackhole exploit kit. Find out what happened and some advice for webmasters to keep their...
View ArticleInfoSec Daily Podcast Episode 593
Episode 593 - What Wikipedia Won’t Tell You, Peep show & Food Hax0ring
View ArticleUsing Filter Files
tcpdump will read BPF's from a file, using the -F switch, making it easy to reuse long, complex or just difficult to remember filters. Unfortunately, there is no way to use a multi-line file, so you...
View ArticleNorman Data Defense Systems Announces New SCADA Security System To Protect...
Norman SCADA Protection installed at the network perimeter
View ArticlePaulDotCom Security Weekly Episode 277
Tune in to PaulDotCom Security Weekly TV, Hack Naked TV, and Hack Naked At Night episodes on our YouTube Channel or our Bliptv channel. Adam Shostack Interview: Drunken Security News Weekly #277:...
View Article