MS Security War Room

This is neat, sorta, Microsoft evidently has their very own Security War Room. Complete with snacks, a global clock and oooo, a motivational picture of Harvey Keitel! I suppose this…

Bomb Threats from Google Hacking?

The worlds of physical and information security are quickly merging into one but people are still trying to take shortcuts. By now most people have heard news reports about bizarre…

True Hackers and Middle America

Once in a great while a technology reporter seems to 'get it' and publishes an acurate article without the FUD and fear mongering that usually accompanies a security related news…

iPhone Security Myths Busted

I know what your thinking, "Not more iPhone! Enough Already!" yeah, I know me to, but seriously there is just to much FUD floating around out there. FUD from reputable…

Anti-Forensic Tools Evolving

Interesting article over at CIO about the current state of anti-forensic software. It talks about specific tools like Timestomp, Slacker, Sam Juicer, Data Mule and others whose sole goal in…

Hacking for Dollars $$$

iDefense just announced a bounty of $16,000 for remotely exploitable zero-day flaw in Apache, BIND, Sendmail, OpenSSH. IIS, or Exchange. This comes on the heals of the $10,000 plus a…

L0pht in Transition 2

So I wrote about the article in CSO Magazine by Michael Fitzgerald earlier this month when the print version came out. Finally it is now online for easy reading by…