InfoSec Daily Podcast Episode 608
Episode 608 - Homograph Attack, Longest DDoS, 25 Anonymous Arrest, Op Perfect Hedge, and How Not-to.
View ArticleSBN Sponsor Post
Share your best advice with us – tell us the best advice you’ve ever received, heard or given.http://bit.ly/xbdT9q
View Articletoolsmith: Pen Testing with Pwn Plug
PrerequisitesSheevaplug4GB SD card (needed for installation)Dedicated to thememory of Tareq Saade 1983-2012:This flesh and bone Is just the way that we are tied in But there's no one homeI grieve for...
View ArticlePIN Guessing
A new paper has been published by Joseph Bonneau, Sören Preibusch, and Ross Anderson of the Computing Laboratory at the University of Cambridge, which estimates the difficulty of guessing 4-digit...
View ArticleNSA, Los Alamos National Laboratory Detail Benefits and How to Use Trusted...
We all have 'em. How to secure 'em? Networks and keeping the information flowing safely was the second topic of the day at Monday's Trusted Computing Group (TCG) RSA Conference session, which opened...
View ArticleUS Securities and Exchange Commission Spam Leads to Exploit and Stealer
When one of our colleagues in Malta received an email in his GMail inbox that purports to originate from the U.S. Securities and Exchange Commission (SEC), he didn’t think twice about sending it over...
View ArticleMobile World Congress 2012 round…
Mobile World Congress 2012 roundup: All you need to know from Barcelona #ITBW The enormous Mobile World Congress is done for another year. Here are your MWC12 highlights from around the Web. In IT...
View ArticleUpdate: 'iPad 3' or '…
Update: 'iPad 3' or 'iPad HD'? It could be the latter. #TLV $AAPL http://blogs.computerworld.com/19802/ipad_3_release_date_not_yet_its_rumored?ua
View ArticleSay NO to Government Censorship of the Internet in Pakistan
According to several organizations, on February 22, 2012, the National ICT R&D Fund, representing the government of Pakistan, placed an advertisement in the press calling on companies to submit...
View ArticleSBN Sponsor Post
RSA Conference US 2012 keynote lineup announced. Tony Blair to give closing keynote address.http://bit.ly/wrm3Aw
View ArticleDreaming of RSA, Thinking of PCI
So I’m not doing booth duty at RSA this year. Instead I’m sitting in my cube reading RSA blogs, looking through RSA press releases, and listening to RSA podcasts, including the PCI Security as a...
View ArticleSharing and Security in the Financial World
By Chris Pickles, Head of Industry Initiatives, Global Banking & Financial Markets, BT Financial institutions are gradually waking up to all that the “cloud” can be about. Not just the “public...
View ArticleI really mean "no" when I say "no"
I've noticed a very annoying pattern recently. The past couple of times that I've gone to a trade show I've been very careful to select the option that's roughly "Do not share my contact information...
View ArticleThe Value of Partnership
Today I want to talk about a very simple idea: A successful implementation begins and ends with a successful partnership. This may sound obvious, but you'd be surprised how many people don't understand...
View ArticleDARPA Seeks Real Time Cognitive Radio Mapping
Meanwhile, in SIGINT news, comes this thought provoking story via the Department of Defense’s Defense Advanced Research Projects Agency [DOD DARPA] targeting cognitive, true real-time mapping...
View ArticleFind the bad guy in a deluge of big data – RSA day three
So someone is attacking you, maybe with a flood of traffic as a noisy backdrop to distract you while the bad guy slips in undetected. So how do you stop the hacker amidst the noise, fast enough to act...
View ArticleNew privacy guidelines for mobile app developers
Host of the Mobile World Congress, the GSMA, have launched new guidelines for mobile app developers to increase transparency and trust between users and companies. Will it work?
View ArticleCloud Fundamentals Video Series: Compliance in the Cloud
Cloud Fundamentals Video Series: Compliance in the Cloud Posted by: Tim Rains, Director, Trustworthy Computing Many organizations want to take advantage of the cloud, but the data within existing...
View Article