I read an excellent article by Nate Anderson in Ars Technica, "How the FBI found Miss Teen USA’s webcam spy" about how they broke the recent Miss USA 'sextortion' case. It got me thinking about how many of my friend and colleagues become temporary IT support personnel at the end or the year trying to … Continue reading Remote Access Tool Misuse & Familial IT Support
Category: security
Why Security is Hard: When APTs became TPAs
Trying to secure the Internet and all it's users, content, and services is a difficult job. The Internet is a global resource that supports many different cultures and languages. The purpose of the various Internet web sites that appear on the Internet vary from commercial sites selling products and services to informational sites about many … Continue reading Why Security is Hard: When APTs became TPAs
NYT: Should Companies Tell Us When They Get Hacked?
NYT: Should Companies Tell Us When They Get Hacked? The New York Times Opinion Pages takes on the question: "Should Companies Tell Us When They Get Hacked?".
Lance Spitzer’s Draft Security Awareness Roadmap
Back in May security professional Lance Spitzer wrote about the challenges facing security professionals in organizing, operating and assessing the maturity of an organization's security awareness program. It was a good that defines five levels of...
CISPA explained
Duqu: Son of Stuxnet
Whoa Verizon!
Verizon now tracks and shares Web surfing, location, app usage http://latimesblogs.latimes.com/technology/2011/10/verizon-now-tracking-web-b...
Best Practices for Fighting Botnets
From Engadget: "... the Department of Homeland Security and National Institute of Standards and Technology (NIST) published a request for information, inviting companies from internet and IT companies to contribute their ideas to a voluntary "code...
IP addressing- A Great Read
Tinfoil Security – Automating Website Protection
this is an interesting startup. I think the key will be how they communicate what they find to the people running the websites and if they can help resolve potential vulnerabilities. What will their "step-by-step" look like? "We're making website ...