Twitter
LinkedIn
RSS

Archive for April 18th, 2012


Suspect In Horrendous, Horrific $129 Mln Ponzi Scheme Surrenders

“William Wise believed that business at his private bank would suffer if he stopped living the life of an executive. So he spent $22

Read More...

Open Source Code in the Enterprise – Keys to Avoiding Vulnerabilities

“Way, way back in December 2008 I wrote a piece on this blog called “Open or Closed [source]? Which is more secure?” and it got some people talking and debating..

Read More...

NIST Workshop: Cybersecurity for Cyber-Physical Systems

“On April 23 and 24, 2012, the NIST ITL Computer Security Division will host a two-day workshop about the cyber security needed for cyber-physical systems (CPSs), with a focus on results of research and real-world deployment experiences. The first day will have speakers that address CPSs across multiple sectors of industry (e.g., automotive, aviation, healthcare). The second day will focus on cyber security needs of CPSs in the electric Smart Grid….”

Read More...

Anonymous Hackers Keep Hacking Away

“The “Anonymous” hackers may have been stung by the FBI, but they have not been perceptibly slowed down. Their exploits continue, most recently aimed at the Chinese government on the one hand, and tech and telecom trade associations on the other

Read More...

Team Poison hackers threaten authorities over leader's arrest

“Hacker crew Team Poison has threatened to target the British authorities over the arrest of its leader, Trick, following the group's high-profile attack on MI6. The group issued the warning via Twitter on Sunday, warning that it will fight back against the arrest of its members. The group linked to a Pastebin statement with a call for other hackers to unite in attacking law enforcement agencies….”

Read More...

Cookbook – Installing Dual Internet

How to install a redundant internet connection on the FortiGate.

Read More...

Filling in some Blanks on Network Segmentation Faults

“My last post had some incomplete thoughts (this is not unusual), and I decided to address some of them (this is unusual). I mentioned that segmenting your network was advantageous for a variety of scanning and monitoring reasons, but I didnt didnt elaborate, let me do that now

Read More...

Infosec Careers Advice from the Pros at Black Hat EU 2012

“At Black Hat Eu 2012 in Amsterdam, we took the opportunity to ask some of the experts in attendance for their tips and advice for people wanting to learn more about information security or further themselves in the field…

Read More...

CISPA Legislation FAQs: The Disturbing Dangers

“CISPA stands for The Cyber Intelligence Sharing and Protection Act, a cybersecurity bill written by Rep. Mike Rogers (R-MI) and Dutch Ruppersberger (D-MD) (H.R. 3523).

Read More...

Building a Better Anonymous: Separating the Philosophical from the Practical

“The case that they make is an interesting one but from my point of view fails to deal with the concept of human nature that will inevitably be the downfall of any such association, group, collective, or whatever else you would like to call it.

Read More...