Cracking iOS Privacy
I had an article pop up on my radar yesterday on iOS Privacy, specifically where a researcher found that a particular app (Path) was uploading data without explicit permission. iOS, in some respects,...
View ArticleBuilding your security policy
LANDesk's Devin Anderson offers five vital strategies you need to know to fend off attacks and safeguard your organization.
View ArticleEmails with Document.zip in the URL leads to malware
MX Lab, http://www.mxlab.eu, started to intercept a new trojan distribution campaign by email where the body of the email message with Document.zip inside an URL that leads to malware. The email is...
View ArticleWarning: Whitney Houston autopsy video links on Facebook aren’t what they seem
The death of pop superstar Whitney Houston made headlines around the world this weekend, and it didn't take long for fraudsters and cybercriminals to cash in on the singer's death. For instance,...
View ArticleRSA Conference 2012 Guide: Network Security
Yesterday, we posted our views on the key themes that you’ll see at the upcoming RSA Conference. Now we’ll starting digging into our main coverage areas. Today, we’ll start with network security....
View ArticleCloud Fundamentals Video Series: e-discovery in the Cloud
Posted By: Tim Rains, Director, Trustworthy Computing Electronic discovery, or e-discovery, is a hot topic among security professionals whose organizations are using cloud services or are evaluating...
View ArticleLinks from 2012-02-14 through 2012-02-15
Links from 2012-02-14 through 2012-02-15: Path iOS app uploads your entire address book to its servers | The Verge – How iPhone Apps Steal Your Contact Data and Why You Can’t Stop It – Your heartbeat...
View ArticleGenetics Inspired Research Prevents Cyber Attacks
Researchers aim to improve defense mechanisms of similar computing infrastructures with minimal human interaction
View ArticleHTTP Parameter Pollution – a Newer Class of Injection Attack
Nowadays, many components from web applications are commonly run on the user’s computer (such as JavaScript), and not just on the application’s provider server (such as Servlets). As time goes by,...
View ArticleLayered Tech Becomes First Hosting And Cloud Provider Offers Compliance...
Company is adding an SLA so that all of its compliance services are guaranteed to pass 100 percent of every audit or assessment
View ArticleA problem with math education
My older son was recently telling me about what it was like to take California's high-school exit exam. This test covers eighth-grade math (not much more than the ambition, distraction, uglification...
View ArticleAberdeen Group Sees Classification As Key To Successful Data Loss Prevention
'You can’t protect what you don’t manage, and you can’t manage what you don’t know about,” says Aberdeen's Derek Brink
View ArticleWhat people think industry analysts do
Try as I might, I couldn’t help myself from joining in on this meme…
View ArticleAcunetix Web Vulnerability Scanner 8 Combats Rise in Web Hacking Attacks
New Automation & Auto-Configuration Features Make Securing Your Website Easier and Faster London, 15th Feburary 2012 – Acunetix, a name on the forefront of the web application security industry,...
View ArticleAlgoSec Automates Management Of Next-Generation Network Security Infrastructure
Security Management Suite provides automated policy analysis and complete change lifecycle management for Palo Alto Networks devices
View ArticleAgile Security
Up until this past year, I had never included any marketing materials in my slides. It never seemed to fit in with a technical presentation, even though I always believed in the Sourcefire product...
View ArticleAdiOS: Say Goodbye to Nosy iPhone Apps
Over the past week there have been a few big stories on iOS apps transmitting users’ address books as a convenience feature. Apple has even found themselves on the congressional hot seat this week...
View ArticleTwitter tarnished by iPhone contact scandal
As Twitter admits that its mobile apps, once installed, download and store your private phonebook information, and Apple get grilled by a congressional inquiry about privacy, we ask whether consumers...
View ArticleBeware the amazon.com cancellation email – Valentine’s Day pharmaceuticals await
Maybe recipients of these emails ordered from Amazon recently – or maybe not. Either way we’re betting many people will click on the links out of curiosity or maybe to protest their order...
View Article