May 09, 2013 Added by:Mike Lennon
Continuing the security industry trend of publishing infographics, the folks at Enterprise Strategy Group published an infographic that illustrates some of the challenges associated with web application security.
May 09, 2013 Added by:Michael Fornal
A security check list is a list of security controls that a vendor or application must meet. These controls can range from how storage back up is to be done, to password complexity requirements. Having a checklist can help you in deciding if the application or vendor conforms to your company’s security requirements.
April 24, 2013 Added by:Rohit Sethi
Many automated scanning solutions are outstanding in their cost effectiveness and ability to find certain classes of vulnerabilities. For example, a properly-configured static analysis solution may help you find every instance of potential SQL injection in your software.
March 21, 2013 Added by:Tom Eston
The Facebook Graph has evolved over the years in order to correlate as much information as possible, making it very easy to search. The issue is that anything you’ve ever posted publically, “Liked,” or were ever tagged in can be quickly searched. Here is how you can protect your privacy...
February 01, 2013 Added by:Electronic Frontier Foundation
In 2013, Congress will tackle several bills—both good and bad—that could shape Internet privacy for the next decade. Some were introduced last year, and some will be completely new. For now, here's what's ahead in the upcoming Congress...
January 31, 2013 Added by:Electronic Frontier Foundation
A transparency report would allow Skype and Microsoft to set the record straight and permit users to make an informed decision about the surveillance risks they’ve taking when they use their product. With great user data comes great responsibility...
January 23, 2013 Added by:Allan Pratt, MBA
It is our responsibility, each and every one of us, to protect our data and our digital footprints, so here are five easy ways to recognize this annual event. But in order to be safe online on a regular basis, practice these activities on a monthly as opposed to annual basis...
January 20, 2013 Added by:Electronic Frontier Foundation
Since Facebook removed the ability to remove yourself from search results altogether, we've put together a quick how-to guide to help you take control over what is featured on your Facebook profile and on Graph Search results...
January 08, 2013 Added by:Ali-Reza Anghaie
I have long said that history and legal precedent will eventually defend "hack back" techniques for those with well established procedures and some degree of market clout (e.g. DIB, Fortune 100s). I've even said, when discussing the Patriot Hacker "The Jester", that self-defense and stand-your-ground will almost certainly come into play and be successfully used in some legal context.
January 04, 2013 Added by:Pierluigi Paganini
It’s the news of the day, a fraudulent digital certificate that could be used for active phishing attacks against Google’s web properties. Using the certificate it is possible to spoof content in a classic phishing schema or perform a man-in-the-middle attack according Google Chrome Security Team and Microsoft experts.
December 14, 2012 Added by:Pierluigi Paganini
Security experts posted a video that demonstrates how it is possible to attack a Samsung Smart TV exploiting a 0-day vulnerability to gain root access on it. The hacker could remotely wipe data from attached storage devices, monitoring and controlling the victim TV...
December 13, 2012 Added by:Michelle Drolet
In order to detect security breaches and guarantee compliance, tamper “proofing” has not been sufficient. When it comes time for a forensic audit, the ability to detect unauthorized changes to digital files becomes invaluable in an investigation...
December 06, 2012 Added by:Electronic Frontier Foundation
On December 14th, we hope that the Northern District of California federal court will agree with us that our case challenging illegal domestic spying should move forward. Warrantless wiretapping isn't a state secret—it's a clear violation of FISA, other laws, and the Constitution...
December 04, 2012 Added by:Electronic Frontier Foundation
We live in an interconnected world, and America's actions on the world stage affect us strongly here at home. Take action now to demand that the U.S. government open up the TPP drafts to the public, and that the government negotiate for your interests - not the entertainment companies'...
December 03, 2012 Added by:Joel Harding
I worked for one company who wanted to get information out quickly to all their stakeholders. The problem was the company was mired in an unhealthy aversion to risk. Their mind-set was avoidance, whereas industry transitioned to risk mitigation. That company is doomed to fail...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013