Looks like I missed this the first time around but there is an article about a speech recently given by Peter Tippet, a VP at Verizon and a scientist at…
Ever hear of CIPAV? It is some pretty bad-ass spyware that tracks every website, every chat, every email that you send from your computer. Maybe you know it by its…
The folks over at CanSecWest will once again be hosting their popular PWN to OWN contest at this years con. I wrote about last year's contest that was won after…
There have been a lot of things happening in the security world lately that I have wanted to write about like Geekonomics, the half million pictures pilfered from MySpace and…
This is neat, sorta, Microsoft evidently has their very own Security War Room. Complete with snacks, a global clock and oooo, a motivational picture of Harvey Keitel! I suppose this…
For some reason I am constantly reminded of the old Schwarzenegger movie Running Man where the game show host Damon Killian yells out "Who loves you and who do you…
The worlds of physical and information security are quickly merging into one but people are still trying to take shortcuts. By now most people have heard news reports about bizarre…
Once in a great while a technology reporter seems to 'get it' and publishes an acurate article without the FUD and fear mongering that usually accompanies a security related news…
I know what your thinking, "Not more iPhone! Enough Already!" yeah, I know me to, but seriously there is just to much FUD floating around out there. FUD from reputable…
Interesting article over at CIO about the current state of anti-forensic software. It talks about specific tools like Timestomp, Slacker, Sam Juicer, Data Mule and others whose sole goal in…
Most Security is Useless
Looks like I missed this the first time around but there is an article about a speech recently given by Peter Tippet, a VP at Verizon and a scientist at…
Feds Use Spyware
Ever hear of CIPAV? It is some pretty bad-ass spyware that tracks every website, every chat, every email that you send from your computer. Maybe you know it by its…
PWN to Own Take 2
The folks over at CanSecWest will once again be hosting their popular PWN to OWN contest at this years con. I wrote about last year's contest that was won after…
Quickies and L0pht News
There have been a lot of things happening in the security world lately that I have wanted to write about like Geekonomics, the half million pictures pilfered from MySpace and…
MS Security War Room
This is neat, sorta, Microsoft evidently has their very own Security War Room. Complete with snacks, a global clock and oooo, a motivational picture of Harvey Keitel! I suppose this…
Who trusts you and who do you trust?
For some reason I am constantly reminded of the old Schwarzenegger movie Running Man where the game show host Damon Killian yells out "Who loves you and who do you…
Bomb Threats from Google Hacking?
The worlds of physical and information security are quickly merging into one but people are still trying to take shortcuts. By now most people have heard news reports about bizarre…
True Hackers and Middle America
Once in a great while a technology reporter seems to 'get it' and publishes an acurate article without the FUD and fear mongering that usually accompanies a security related news…
iPhone Security Myths Busted
I know what your thinking, "Not more iPhone! Enough Already!" yeah, I know me to, but seriously there is just to much FUD floating around out there. FUD from reputable…
Anti-Forensic Tools Evolving
Interesting article over at CIO about the current state of anti-forensic software. It talks about specific tools like Timestomp, Slacker, Sam Juicer, Data Mule and others whose sole goal in…
« Previous Page — Next Page »