Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How Not to Buy Tax Software

Scott Henry scoured the Web for a good deal on buying tax preparation software. His search ended at Blvdsoftware.com, which advertised a great price and an instant download. But when it came time to...

View Article


Image may be NSFW.
Clik here to view.

Incite 2/22/2012 – Poop Flingers

It’s a Presidential election year here in the US, and that means the master spin meisters, manipulators, and liars politicians will be out in full force. Normally I just tune out, wait for the primary...

View Article


Image may be NSFW.
Clik here to view.

The 4 Best Locations for Security Cameras

Security cameras are used for two basic purposes: investigation and deterrence. The images that you collect with your security cameras will most often be used to review a crime or accident so that you...

View Article

Image may be NSFW.
Clik here to view.

Plotting photo location data with Bing

A couple weeks ago, the Girl, Unallocated blog published an article called "Geolocation From Photos = Good Stuff." Her post got me thinking about writing a little bash one-liner to use exiftool to...

View Article

Image may be NSFW.
Clik here to view.

MS Office on iPad soon (ignore M…

MS Office on iPad soon (ignore Microsoft denials) #ITBW.by +Richi Jennings for +Computerworld...$MSFT $AAPL

View Article


Image may be NSFW.
Clik here to view.

Alleged fraudster has until next week to decrypt her hard drive for prosecutors

Prosecutors are keen to discover what is on the encrypted laptop of Ramona Fricosu, a Colorado woman accused of committing financial fraud. The case has raised interesting questions of whether you can...

View Article

Image may be NSFW.
Clik here to view.

Beware Changelog spammed-out malware attack

Internet users are receiving emails claiming to contain a changelog - but the files attached are really designed to infect computers.

View Article

Image may be NSFW.
Clik here to view.

IRS releases its top ‘Dirty Dozen’ tax scams

Ushering in tax season, the U.S. Internal Revenue Service (IRS) has released its annual "Dirty Dozen" tax scams for 2012.

View Article


Image may be NSFW.
Clik here to view.

Infographic: Compromised Websites – An Owner’s Perspective

View Article


Image may be NSFW.
Clik here to view.

Tenable Network Security Podcast Episode 114 – "0day exploit sales, software...

Welcome to the Tenable Network Security Podcast Episode 114 Hosts Paul Asadoorian, Product Evangelist Carlos Perez, Lead Vulnerability Researcher Ron Gula, CEO/CTO Announcements Check out our video...

View Article

Image may be NSFW.
Clik here to view.

SBN Sponsor Post

Follow RSA Conference on Twitter http://bit.ly/aUHdtm

View Article

Image may be NSFW.
Clik here to view.

Metasploit 4.2 release: Brute force of vSphere API

Rapid 7 Metasploit 4.2 today is announcing a brute force attack on weak passwords in vSphere web services APIs (vmware-api). Their repository also shows updates to the ESX scanner as well as a few...

View Article

Image may be NSFW.
Clik here to view.

IMP or CCDP? Who cares, it’s still storing your data

The Communications Capabilities Development Programme is the Coalition's attempt at rehashing Labour's failed surveillance reforms. The Interception Modernisation Programme was the subject of much...

View Article


Image may be NSFW.
Clik here to view.

Mergers and Acquisitions: A Security Point of View

Guest post by Matthew Pascucci, Information Security Writer and Practitioner. In today’s business environment, mergers and acquisitions occur on a regular basis. While many different organizational...

View Article

Image may be NSFW.
Clik here to view.

Are Security Risk Assessments Outdated?

Spurred by a discussion at a BT security forum, we asked our experts for their opinions on the following statement, “I think risk assessments are an outdated rather subjective approach to security....

View Article


Image may be NSFW.
Clik here to view.

ADT Business Solutions Kicks Off 2012 Security Solutions and Technology Road...

ADT Business Solutions presented the Los Angeles Boys & Girls Club with a Hosted Video Security System at its recent Security Solutions and Technology Show, which kicked off in Los Angeles. This...

View Article

Image may be NSFW.
Clik here to view.

The sort of spam that I still enjoy getting

I'm still getting invitations for my wife's favorite stuffed otter to join the exclusive ranks of those successful professionals who are lucky enough to get their biographies included in a book that...

View Article


Image may be NSFW.
Clik here to view.

Information Superiority as an Enabler of Continuous Capability

Recently we at Sourcefire have been doing a good deal of talking publicly about our ideas around Information Superiority. The concept is not particularly difficult – the basic idea is that network...

View Article

Image may be NSFW.
Clik here to view.

Security Personae, the Rockstar

Information security is full of personality. The people that make it up group themselves into a few personae. Let’s start with the front men in information security? Chances are, you probably have a...

View Article

Image may be NSFW.
Clik here to view.

Readers’ Poll – Security Threats to Your Business

Take Our Poll

View Article
Browsing all 37364 articles
Browse latest View live


Latest Images