Most Security is Useless

Looks like I missed this the first time around but there is an article about a speech recently given by Peter Tippet, a VP at Verizon and a scientist at…

Feds Use Spyware

Ever hear of CIPAV? It is some pretty bad-ass spyware that tracks every website, every chat, every email that you send from your computer. Maybe you know it by its…

PWN to Own Take 2

The folks over at CanSecWest will once again be hosting their popular PWN to OWN contest at this years con. I wrote about last year's contest that was won after…

Quickies and L0pht News

There have been a lot of things happening in the security world lately that I have wanted to write about like Geekonomics, the half million pictures pilfered from MySpace and…

MS Security War Room

This is neat, sorta, Microsoft evidently has their very own Security War Room. Complete with snacks, a global clock and oooo, a motivational picture of Harvey Keitel! I suppose this…

Bomb Threats from Google Hacking?

The worlds of physical and information security are quickly merging into one but people are still trying to take shortcuts. By now most people have heard news reports about bizarre…

True Hackers and Middle America

Once in a great while a technology reporter seems to 'get it' and publishes an acurate article without the FUD and fear mongering that usually accompanies a security related news…

iPhone Security Myths Busted

I know what your thinking, "Not more iPhone! Enough Already!" yeah, I know me to, but seriously there is just to much FUD floating around out there. FUD from reputable…

Anti-Forensic Tools Evolving

Interesting article over at CIO about the current state of anti-forensic software. It talks about specific tools like Timestomp, Slacker, Sam Juicer, Data Mule and others whose sole goal in…