Twitter
LinkedIn
RSS

Archive for April 20th, 2012


Friday Squid Blogging: Extracting Squid Ink

How to extract squid ink . As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Read More...

Certificate Authorities: A Means to Advanced Security, But Not the End

“Certificate authorities (CAs) are critical links in the chain that ensures the quality and integrity of enterprise IT security, compliance and operations. CAs issue and ensure valuable third-party trust for human-to-machine and machine-to-machine communications and authentication. However, leveraging the security benefits of trust providers like CAs doesn't relieve your organization of its management responsibilities….”

Read More...

Effective Security Requires Context

“Why is context important? Because without context, information is not really information; it is just data. Data is just stuff, while information is what that stuff means….”

Read More...

Will pillow talk betray my business secrets?

“One of my senior employees recently got married and her new husband works for ourclosest competitor. I am extremely concerned that she may – willingly or by mistake – disclose confidential information to him

Read More...

Hacker attack underlines Web role in China scandal

“A massive hacker attack has crippled an overseas website that has reported extensively on China's biggest political turmoil in years, underscoring the pivotal role the Internet has played in the unfolding scandal. North Carolina-based Boxun

Read More...

Javvad Malik on Hacking Tools and Ethics

“Joshua Corman wrote a post entitled HD Moores Law in which he raises some valid points around the fact that tools like Metasploit make it incredibly easy for anyone with little or no knowledge to be able to test a system for vulnerabilities. Naturally, the purpose of this or other such tools is to aid a security tester in finding these vulnerabilities. However, like any such tool, you cannot dictate if someone will use this for attack or defensive purposes….”

Read More...

On Cyber Threats in the Mobile Environment

“Today I desire to share with you the results of a study by security firm Trend Micro which is focused on mobile threat incidents related to the first quarter of 2012. The large diffusion of mobile devices and the lack of awareness of principal cyber threats have produced an increasing interest by cybercriminals in the mobility sector, and the Android platform is the most targeted with over 5000 new malicious apps.

Read More...

The importance of ethical hacking

“The need for more effective information security practices is increasingly evident with each security breach reported in the media.

Read More...

Anonymous Hacker Brags On Twitter And Gets Caught

“We imagine that one of the hardest parts about being an Anonymous hacker is remaining anonymous.

Read More...