iDefense just announced a bounty of $16,000 for remotely exploitable zero-day flaw in Apache, BIND, Sendmail, OpenSSH. IIS, or Exchange. This comes on the heals of the $10,000 plus a…
So I wrote about the article in CSO Magazine by Michael Fitzgerald earlier this month when the print version came out. Finally it is now online for easy reading by…
So why are there so many bad, nonsecure and just plain broken security products on the market? Should we depend on the unseen hand of the free market to allow…
So by now you have probably heard about the MacBook Pro that was compromised at CanSecWest last Friday. Here is a quick recap if you missed it. A MacBook Pro…
Over and over people tell me that a product, service or other item is secure because someone else important uses it, and they are sooo important that they would never…
The April 2007 print issue of CSO Magazine has a nice article on page 30 by Michael Fitzgerald entitled "L0pht In Transition." Unfortunately they don't have a version online or…
I have been trying to beat people over the head about cell phone security issues for years. It amazing how much people trust those things. They look at it like…
Ok, this is just to funny not to write about. As a previous Blackhat attendee (and speaker) my name is on the mailing list of whoever owns the conferance these…
I am very very happy about this. <danceofjoy> I finally own hackernews.com again! </danceofjoy> many many thanks to Dave for keeping watch over the domain and not gouging me to…
Hacking for Dollars $$$
iDefense just announced a bounty of $16,000 for remotely exploitable zero-day flaw in Apache, BIND, Sendmail, OpenSSH. IIS, or Exchange. This comes on the heals of the $10,000 plus a…
L0pht in Transition 2
So I wrote about the article in CSO Magazine by Michael Fitzgerald earlier this month when the print version came out. Finally it is now online for easy reading by…
Cyber UL
So why are there so many bad, nonsecure and just plain broken security products on the market? Should we depend on the unseen hand of the free market to allow…
Mac Hack Hype
So by now you have probably heard about the MacBook Pro that was compromised at CanSecWest last Friday. Here is a quick recap if you missed it. A MacBook Pro…
Who Do You Trust?
Over and over people tell me that a product, service or other item is secure because someone else important uses it, and they are sooo important that they would never…
L0pht in Transition
The April 2007 print issue of CSO Magazine has a nice article on page 30 by Michael Fitzgerald entitled "L0pht In Transition." Unfortunately they don't have a version online or…
More Cell Phone Security Myths
I have been trying to beat people over the head about cell phone security issues for years. It amazing how much people trust those things. They look at it like…
Stupid Surveys
Ok, this is just to funny not to write about. As a previous Blackhat attendee (and speaker) my name is on the mailing list of whoever owns the conferance these…
WordPress is Installed
I figured if I'm going to do this blogging thing I should get some real software instead of editing an HTML file by hand. Not that I mind writing raw…
I have HNN Back!!!
I am very very happy about this. <danceofjoy> I finally own hackernews.com again! </danceofjoy> many many thanks to Dave for keeping watch over the domain and not gouging me to…
« Previous Page — Next Page »