Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Beethoven’s Weather

via Book of Joe, further via Open Culture and Devour; Superb. ↀ

View Article


Image may be NSFW.
Clik here to view.

Cracking iOS Privacy

I had an article pop up on my radar yesterday on iOS Privacy, specifically where a researcher found that a particular app (Path) was uploading data without explicit permission. iOS, in some respects,...

View Article


Image may be NSFW.
Clik here to view.

Building your security policy

LANDesk's Devin Anderson offers five vital strategies you need to know to fend off attacks and safeguard your organization.

View Article

Image may be NSFW.
Clik here to view.

Emails with Document.zip in the URL leads to malware

MX Lab, http://www.mxlab.eu, started to intercept a new trojan distribution campaign by email where the body of the email message with Document.zip inside an URL that leads to malware. The email is...

View Article

Image may be NSFW.
Clik here to view.

Warning: Whitney Houston autopsy video links on Facebook aren’t what they seem

The death of pop superstar Whitney Houston made headlines around the world this weekend, and it didn't take long for fraudsters and cybercriminals to cash in on the singer's death. For instance,...

View Article


Image may be NSFW.
Clik here to view.

RSA Conference 2012 Guide: Network Security

Yesterday, we posted our views on the key themes that you’ll see at the upcoming RSA Conference. Now we’ll starting digging into our main coverage areas. Today, we’ll start with network security....

View Article

Image may be NSFW.
Clik here to view.

Cloud Fundamentals Video Series: e-discovery in the Cloud

Posted By: Tim Rains, Director, Trustworthy Computing Electronic discovery, or e-discovery, is a hot topic among security professionals whose organizations are using cloud services or are evaluating...

View Article

Image may be NSFW.
Clik here to view.

Links from 2012-02-14 through 2012-02-15

Links from 2012-02-14 through 2012-02-15: Path iOS app uploads your entire address book to its servers | The Verge – How iPhone Apps Steal Your Contact Data and Why You Can’t Stop It – Your heartbeat...

View Article


Image may be NSFW.
Clik here to view.

Genetics Inspired Research Prevents Cyber Attacks

Researchers aim to improve defense mechanisms of similar computing infrastructures with minimal human interaction

View Article


Image may be NSFW.
Clik here to view.

HTTP Parameter Pollution – a Newer Class of Injection Attack

Nowadays, many components from web applications are commonly run on the user’s computer (such as JavaScript), and not just on the application’s provider server (such as Servlets). As time goes by,...

View Article

Image may be NSFW.
Clik here to view.

Layered Tech Becomes First Hosting And Cloud Provider Offers Compliance...

Company is adding an SLA so that all of its compliance services are guaranteed to pass 100 percent of every audit or assessment

View Article

Image may be NSFW.
Clik here to view.

A problem with math education

My older son was recently telling me about what it was like to take California's high-school exit exam. This test covers eighth-grade math (not much more than the ambition, distraction, uglification...

View Article

Image may be NSFW.
Clik here to view.

Aberdeen Group Sees Classification As Key To Successful Data Loss Prevention

'You can’t protect what you don’t manage, and you can’t manage what you don’t know about,” says Aberdeen's Derek Brink

View Article


Image may be NSFW.
Clik here to view.

What people think industry analysts do

Try as I might, I couldn’t help myself from joining in on this meme…

View Article

Image may be NSFW.
Clik here to view.

Acunetix Web Vulnerability Scanner 8 Combats Rise in Web Hacking Attacks

New Automation & Auto-Configuration Features Make Securing Your Website Easier and Faster London, 15th Feburary 2012 – Acunetix, a name on the forefront of the web application security industry,...

View Article


Image may be NSFW.
Clik here to view.

AlgoSec Automates Management Of Next-Generation Network Security Infrastructure

Security Management Suite provides automated policy analysis and complete change lifecycle management for Palo Alto Networks devices

View Article

Image may be NSFW.
Clik here to view.

Agile Security

Up until this past year, I had never included any marketing materials in my slides.  It never seemed to fit in with a technical presentation, even though I always believed in the Sourcefire product...

View Article


Image may be NSFW.
Clik here to view.

AdiOS: Say Goodbye to Nosy iPhone Apps

Over the past week there have been a few big stories on iOS apps transmitting users’ address books as a convenience feature. Apple has even found themselves on the congressional hot seat this week...

View Article

Image may be NSFW.
Clik here to view.

Twitter tarnished by iPhone contact scandal

As Twitter admits that its mobile apps, once installed, download and store your private phonebook information, and Apple get grilled by a congressional inquiry about privacy, we ask whether consumers...

View Article

Image may be NSFW.
Clik here to view.

Beware the amazon.com cancellation email – Valentine’s Day pharmaceuticals await

Maybe recipients of these emails ordered from Amazon recently – or maybe not.  Either way we’re betting many people will click on the links out of curiosity or maybe to protest their order...

View Article
Browsing all 37364 articles
Browse latest View live