Telstra Bigpond users targeted in post-data-breach phishing campaign
A phishing campaign targeting users of Telstra Bigpond, Australia's largest ISP, is urging users to confirm their billing information or risk suspension. All pretty run-of-the-mill, but neatly timed...
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticlePeople’s Gas Breach not Infinite
According to the latest reports from the Chicago-area a contractor who breached an energy company was unable to steal infinity. It's still bad news for the "finite" number of records he did access....
View ArticleMythBuster’s Accident: The Breach Apology
I wrote just a few days ago about the cannonball that got away. Then I forgot about the story until I just happened to notice the Mythbuster's show hosts being quoted with contradictory statements in...
View ArticleIncite 12/14/2011: Family Matters
There are a couple calls you just don’t want to get. Like from the FBI when you’ve had some kind of breach and your secret recipe is listed on eBay. Or from the local cops because your kids did...
View ArticleInsider Threat Analysis
This is a very interesting piece about the psychological aspects of insider threat from Symantec. While I don't think that it has any remarkable individual insights it does puts this issue in a very...
View ArticleBloomberg Fear: All Has Been Lost to Chinese
Anyone remember the controversy in Europe over Americans stealing commercial secrets? I'm not talking about Budweiser, Cheddar Cheese, Parmesan Cheese or the millions of others ideas ruthlessly...
View ArticleWe Like War
by George Carlin [[ This is a summary only. Read more at flyingpenguin.com ]]
View ArticleCryptography and Tattoos
By Dr. Robert Ghanea-Hercock, Chief Researcher, BT Security Research Practice Wouldn’t it be nice if data could be secure? Long before computer experts were invented the military have been obsessed...
View ArticleRogue Cloud Detection
With the exponential growth of virtualization and its leverage at the enterprise, it is getting more and easier to create a replica of a solution set at any virtualization ready host farm. Until...
View ArticleUSMC Mission SUPAI 2011
Santas’ Newest Sleigh -(Image Credit: USMC Photograph by AJ Parson, SGT, USMC Mission Name: SUPAI 2011 Another successful mission is evidenced by tis superb photograph (by AJ Parson SGT USMC HMM-764)...
View ArticleBonkersWorld: Means of Communication
from the tech commentary genius of Manu Cornet at BonkersWorld.com
View Article2012 Predictions: SEO poisoning, botnets, mobile malware, increasing awareness
To round out our series of malware and cybercrime predictions here are some of my thoughts on what the next 12 months will bring. I expect more high profile arrests of cyber-criminals but no abatement...
View ArticlePentest Plugin Part 1
pre { border: 1px solid #999; /*padding:5px;*/ -webkit-border-radius:6px; -moz-border-radius:6px; border-radius:6px; background: #eee; word-wrap: break-word; white-space:pre; white-space:pre-line;...
View Article3 steps to safer gadget giving
The holiday season, dare I say Christmas or Hanukkah, is upon us and it's that time when many of you will be buying cool gadgets for your friends, spouses, and family. I'd like to take a few minutes...
View ArticleSecondary Shell Using Scripting Environment on Target
After writing the payload inject module for Windows I was looking thru my Twitter feed and saw a tweet from Chris John Riley on the PentestMonkey website where he has a cheat sheet that shows how to...
View ArticleGers Pardoel – Ik Neem Je Mee
Ik Neem Je Mee by Gers Pardoel (animation by Job, Joris & Marieke) Translation from Dutch to English. [[ This is a summary only. Read more at flyingpenguin.com ]]
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticleMetasploit Modules: Update 2011-12-19
The following modules have been added to the Metasploit SVN between SVN version 14425 and 14425 More information on these modules can be found in the Metasploit Repository * This is an automated...
View Article