How Not to Buy Tax Software
Scott Henry scoured the Web for a good deal on buying tax preparation software. His search ended at Blvdsoftware.com, which advertised a great price and an instant download. But when it came time to...
View ArticleIncite 2/22/2012 – Poop Flingers
It’s a Presidential election year here in the US, and that means the master spin meisters, manipulators, and liars politicians will be out in full force. Normally I just tune out, wait for the primary...
View ArticleThe 4 Best Locations for Security Cameras
Security cameras are used for two basic purposes: investigation and deterrence. The images that you collect with your security cameras will most often be used to review a crime or accident so that you...
View ArticlePlotting photo location data with Bing
A couple weeks ago, the Girl, Unallocated blog published an article called "Geolocation From Photos = Good Stuff." Her post got me thinking about writing a little bash one-liner to use exiftool to...
View ArticleMS Office on iPad soon (ignore M…
MS Office on iPad soon (ignore Microsoft denials) #ITBW.by +Richi Jennings for +Computerworld...$MSFT $AAPL
View ArticleAlleged fraudster has until next week to decrypt her hard drive for prosecutors
Prosecutors are keen to discover what is on the encrypted laptop of Ramona Fricosu, a Colorado woman accused of committing financial fraud. The case has raised interesting questions of whether you can...
View ArticleBeware Changelog spammed-out malware attack
Internet users are receiving emails claiming to contain a changelog - but the files attached are really designed to infect computers.
View ArticleIRS releases its top ‘Dirty Dozen’ tax scams
Ushering in tax season, the U.S. Internal Revenue Service (IRS) has released its annual "Dirty Dozen" tax scams for 2012.
View ArticleTenable Network Security Podcast Episode 114 – "0day exploit sales, software...
Welcome to the Tenable Network Security Podcast Episode 114 Hosts Paul Asadoorian, Product Evangelist Carlos Perez, Lead Vulnerability Researcher Ron Gula, CEO/CTO Announcements Check out our video...
View ArticleMetasploit 4.2 release: Brute force of vSphere API
Rapid 7 Metasploit 4.2 today is announcing a brute force attack on weak passwords in vSphere web services APIs (vmware-api). Their repository also shows updates to the ESX scanner as well as a few...
View ArticleIMP or CCDP? Who cares, it’s still storing your data
The Communications Capabilities Development Programme is the Coalition's attempt at rehashing Labour's failed surveillance reforms. The Interception Modernisation Programme was the subject of much...
View ArticleMergers and Acquisitions: A Security Point of View
Guest post by Matthew Pascucci, Information Security Writer and Practitioner. In today’s business environment, mergers and acquisitions occur on a regular basis. While many different organizational...
View ArticleAre Security Risk Assessments Outdated?
Spurred by a discussion at a BT security forum, we asked our experts for their opinions on the following statement, “I think risk assessments are an outdated rather subjective approach to security....
View ArticleADT Business Solutions Kicks Off 2012 Security Solutions and Technology Road...
ADT Business Solutions presented the Los Angeles Boys & Girls Club with a Hosted Video Security System at its recent Security Solutions and Technology Show, which kicked off in Los Angeles. This...
View ArticleThe sort of spam that I still enjoy getting
I'm still getting invitations for my wife's favorite stuffed otter to join the exclusive ranks of those successful professionals who are lucky enough to get their biographies included in a book that...
View ArticleInformation Superiority as an Enabler of Continuous Capability
Recently we at Sourcefire have been doing a good deal of talking publicly about our ideas around Information Superiority. The concept is not particularly difficult – the basic idea is that network...
View ArticleSecurity Personae, the Rockstar
Information security is full of personality. The people that make it up group themselves into a few personae. Let’s start with the front men in information security? Chances are, you probably have a...
View Article