Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

IDApro and Microsoft

I want to respond to the following tweet, but in more than 140 characters:40mcomex ‏ @comex Reply  Retweet  Favorite · OpenIn which Microsoft posts an IDA screenshot of their own code? RT@dragosr:...

View Article


Image may be NSFW.
Clik here to view.

InfoSec Daily Podcast Episode 603

Episode 603 - Irish Data, Certificate Authorities, 10.8 million, Skype, OH Infragard & Pastebin

View Article


Image may be NSFW.
Clik here to view.

The “Man in the Browser” attack

Gizmodo reports: New “Man in the Browser” Attack Bypasses Banks’ Two-Factor Authentication Systems Except there is nothing new about this attack. OWASP documented it in 2007 and it was widely known...

View Article

Image may be NSFW.
Clik here to view.

SBN Sponsor Post

Get a sneak peak into RSA Conference 2012 with podcasts from industry experts and speakers.http://bit.ly/fmaLXU

View Article

Image may be NSFW.
Clik here to view.

Six ways to be a model cyber citizen

Be cyber security aware, use security best practices and report cyber crime Use an antivirus product as it helps not only to protect you but prevents your computer from hosting malware that affect...

View Article


Image may be NSFW.
Clik here to view.

DShield

DShield is an extension of the SANS Internet Storm Center and is a "distributed intrusion detection system for data collection and analysis", to quote their site. What this means, quite simply, is that...

View Article

Image may be NSFW.
Clik here to view.

AT&T provides free user information yet again

In 20101, a few grey hat hackers (like weev) were arrested for downloading information about new iPad users that ATT had provided freely on its website. All the hackers did was download what ATT freely...

View Article

Image may be NSFW.
Clik here to view.

Sqlitespy for Sqlite Database analysis

Sqlite is the ubiquitous database for mobile applications on iPad, iPhone and Android. It is also used by certain internet browsers, web application frameworks and software products for their local...

View Article


Image may be NSFW.
Clik here to view.

CSO Column: Improve your security leadership with one simple lesson from improv

Improv is great to watch and even more fun to learn and play (perform). There is a fundamental concept of improv that is essential for success — in improv, in life, and definitely for security...

View Article


Image may be NSFW.
Clik here to view.

SBN Sponsor Post

Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l

View Article

Image may be NSFW.
Clik here to view.

Real Government Cloud Computing Efforts

What’s really going on with cloud computing in government? That’s been the key question for both public and private sector technology and security leaders over the past few years. Other perplexing...

View Article

Image may be NSFW.
Clik here to view.

FUD It’s What’s For Breakfast

I have screamed at vendors in the past for resorting to using fear uncertainty and doubt (FUD) to promote their wares. This does little more than a blistering disservice to the industry as a whole....

View Article

Image may be NSFW.
Clik here to view.

New Research: Majority of Cloud Deployments Not Secure

Surprised? Don’t be [notice the almost - but not quite- complete lack of any mention of ‘I told you so’]… ☁

View Article


Image may be NSFW.
Clik here to view.

XKCD: Business Plan

via the genius of Randall Munroe at XCKD.com

View Article

Image may be NSFW.
Clik here to view.

Solving Kioptrix Level 2 (SQL Injection)

*** SPOILER ALERT ***   *** SPOILER ALERT ***   *** SPOILER ALERT ***   *** SPOILER ALERT *** It's no secret that I like a challenge and I recently came across the Kioptrix series of challenge VM's....

View Article


Image may be NSFW.
Clik here to view.

MindshaRE: Yo Dawg, I heard you like reversing…

Posted by Aaron Portnoy ...so I reversed your reversing tool to help you reverse better. MindshaRE is our periodic look at some simple reverse engineering tips and tricks. The goal is to keep things...

View Article

Image may be NSFW.
Clik here to view.

Government Ready to Use Physical Force During Cyberattack?

Here's a quote I came upon after researching DDoS attacks against root name servers.  "If the United States found itself under a major cyberattack aimed at undermining the nation’s critical information...

View Article


Image may be NSFW.
Clik here to view.

SBN Sponsor Post

Follow RSA Conference on Twitter http://bit.ly/aUHdtm

View Article

Image may be NSFW.
Clik here to view.

Voice spam tried to disrupt election in Ontario, Canada

This week, news has emerged in Canada of a police investigation into the use of robocalling (automated phone dialling, a.k.a. voice spam) in an apparent attempt to disrupt an election result.

View Article

Image may be NSFW.
Clik here to view.

SSCC 84 – Cookie-gate, laptop security advice, Stratfor malicious emails and...

Paul Ducklin hosts this week's Chet Chat with the tables turned... Chet is the guest. They discussed the recent Google cookie-gate incident, House Intelligence Committee advice on using laptops while...

View Article
Browsing all 37364 articles
Browse latest View live


Latest Images