September 20, 2010
PCI at DefCon? Are you on drugs? Sadly, no- compliance is changing the way companies "do security", and that has an effect on everyone, defender, attacker, or innocent bystander. If you think all that 0-day you've heard about this week is scary, ask yourself this: if a company accepts credit cards for payment, which is a more immediate threat- failing an audit or the possibility of being compromis...
August 17, 2010
If you haven't noticed the Metasploit Framework has a JAVA meterpreter payload for some time now It supports all the commands supported by the PHP meterpreter, as of SVN revision 9777, and additionally the ipconfig, route, and screenshot commands. It is not fully implemented into the framework yet and in order to get it up and running some manual tweaking is needed.
August 11, 2010
Data loss protection is still an evolving field, but Blue Coat brings a comprehensive solution that can be quickly configured to stop leaks of confidential data to unauthorized users. Is your data leaving with employees that are getting downsized? Is your customer list now the property of one of your competitor's? The Blue Coat DLP Appliance can detect when critical information is being copied fro...
May 30, 2010
Special guest in Ruth Jacobs from Barclay Simpson talking about the Infosec job market, the weirdest types of emails they receive and how they can tell when a candidate is lying on their CV. Ruth also gets a chance to interview our resident cynics to see if they would stand a chance in getting a job in the security market.
May 24, 2010
Fake facebook logo's and Polish priests. Georgina also challenges Javvad to try and bypass the security controls on her laptop? Will she succeed? Or will Javvad take another step towards world domination... and who is this mysterious Peter Stevens guy?
May 18, 2010
Our hosts catch up with the Director of Marmalade Box, Mr Bruce Hallas where he shares his insights into the world of Information Security. How can you ensure your employee's won't walk away with your database, and why trust is such an important factor in cross business communications.
May 10, 2010
Javvad and Georgina cover issues such as a website that helps thieves rob you, a not so secure combination lock, Argos sending out credit card numbers in emails and they look into seeing if they can produce their own press release for a company that has suffered a data breach.
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013