The folks over at CanSecWest will once again be hosting their popular PWN to OWN contest at this years con. I wrote about last year's contest that was won after…
There have been a lot of things happening in the security world lately that I have wanted to write about like Geekonomics, the half million pictures pilfered from MySpace and…
This is neat, sorta, Microsoft evidently has their very own Security War Room. Complete with snacks, a global clock and oooo, a motivational picture of Harvey Keitel! I suppose this…
For some reason I am constantly reminded of the old Schwarzenegger movie Running Man where the game show host Damon Killian yells out "Who loves you and who do you…
The worlds of physical and information security are quickly merging into one but people are still trying to take shortcuts. By now most people have heard news reports about bizarre…
Once in a great while a technology reporter seems to 'get it' and publishes an acurate article without the FUD and fear mongering that usually accompanies a security related news…
So the folks over at Independent Security Evaluators claim to have found a remote iPhone exploit. Evidently this is big news as it has already garned an article in the…
I know what your thinking, "Not more iPhone! Enough Already!" yeah, I know me to, but seriously there is just to much FUD floating around out there. FUD from reputable…
Interesting article over at CIO about the current state of anti-forensic software. It talks about specific tools like Timestomp, Slacker, Sam Juicer, Data Mule and others whose sole goal in…
PWN to Own Take 2
The folks over at CanSecWest will once again be hosting their popular PWN to OWN contest at this years con. I wrote about last year's contest that was won after…
Quickies and L0pht News
There have been a lot of things happening in the security world lately that I have wanted to write about like Geekonomics, the half million pictures pilfered from MySpace and…
L0pht reunion? Source 2008
Well it looks there may be a mini reunion of old L0pht folks. We are still trying to round everyone up but there will more of us together on one…
MS Security War Room
This is neat, sorta, Microsoft evidently has their very own Security War Room. Complete with snacks, a global clock and oooo, a motivational picture of Harvey Keitel! I suppose this…
Who trusts you and who do you trust?
For some reason I am constantly reminded of the old Schwarzenegger movie Running Man where the game show host Damon Killian yells out "Who loves you and who do you…
Bomb Threats from Google Hacking?
The worlds of physical and information security are quickly merging into one but people are still trying to take shortcuts. By now most people have heard news reports about bizarre…
True Hackers and Middle America
Once in a great while a technology reporter seems to 'get it' and publishes an acurate article without the FUD and fear mongering that usually accompanies a security related news…
Remote iPhone exploit? Big Deal.
So the folks over at Independent Security Evaluators claim to have found a remote iPhone exploit. Evidently this is big news as it has already garned an article in the…
iPhone Security Myths Busted
I know what your thinking, "Not more iPhone! Enough Already!" yeah, I know me to, but seriously there is just to much FUD floating around out there. FUD from reputable…
Anti-Forensic Tools Evolving
Interesting article over at CIO about the current state of anti-forensic software. It talks about specific tools like Timestomp, Slacker, Sam Juicer, Data Mule and others whose sole goal in…
« Previous Page — Next Page »