• Don't fight cybercrime on your own - do it with Synergy!

    Updated: 2011-09-29 04:03:28
    Next week, I'll be talking at the Identity and Hi-Tech Crime Symposium 2011 in Gold Coast, Queensland, Australia. There's still time for last-minute registrations at the event, so if you're in the region, why not join me there?

  • SSL authenticity evolution

    Updated: 2011-09-27 23:11:38
    After attending the annual GrrCON in Grand Rapids, Michigan I thought I would share my thoughts on the keynote address delivered by Moxie Marlinspike. Moxie detailed the problems with the existing certificate authority system and proposed his ideas for a solution.

  • iShot 2.0

    Updated: 2011-09-27 19:00:45
    This portable alarm clock contains a high quality hidden video camera and records to a micro SD card.

  • Benefits of being a CISSP

    Updated: 2011-09-24 20:15:57
    J4vv4D posts some brilliant videos on his infoseccynic channel at YouTube.  Good way to kill a Saturday.  Embedded below is his video from July on the benefits of being a “sysp”.   For whatever reason, it was a popular certification to pick up at work this past year.   So for the benefit of my co-workers, here you go.   So [...]

  • BEAST Mode

    Updated: 2011-09-23 17:38:49
    Since Tuesday, the Internets have been abuzz with discussion of BEAST (Browser Exploit Against SSL/TLS) and its attack on SSL/TLS.  For more info on that check out H-Security’s article.   One recommendation before the presentation was to enable TLS 1.1 or 1.2 as this is an attack on TLS 1.0.  While Microsoft Windows 7 includes support [...]

  • MihwaLee Blog Central

    Updated: 2011-09-22 23:45:43
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive September 2011 24 August 2011 42 July 2011 33 June 2011 41 May 2011 43 April 2011 43 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 400 Corporate 220 Enterprise 390 McAfee Labs 1098 Tags 1 million guarantee access to live fraud resolution agents Acquisition Android botnet Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying

  • PageOne Pr Blog Central

    Updated: 2011-09-22 23:45:42
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive September 2011 24 August 2011 42 July 2011 33 June 2011 41 May 2011 43 April 2011 43 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 400 Corporate 220 Enterprise 390 McAfee Labs 1098 Tags 1 million guarantee access to live fraud resolution agents Acquisition Android botnet Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying

  • ECCouncil C|CISO Certification

    Updated: 2011-09-22 15:52:52
    The ECCouncil announced C|CISO  a new certification for Cheif Information Security Officers (CISO) and those who want to be CISOs. The certification is focused on five domains: Governance (Policy, Legal & Compliance) IS Management Controls and Auditing Management (Projects, Technology & Operations) Management – Projects and Operations Information Security Core Competencies Strategic Planning & Finance As you can tell [...]

  • Cross-Site Scripting, Without the Scripting… or the Site

    Updated: 2011-09-21 22:34:06
    I often talk about cross-site scripting (XSS), and that’s partly because I think it’s a pretty interesting type of vulnerability that many developers tend to overlook. It can be quite dangerous, but can also be quite misunderstood. For one thing, the name can be misleading: exploiting XSS does not always involve scripting, and the proliferation [...]

  • andrewchaplin Blog Central

    Updated: 2011-09-20 20:12:18
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive September 2011 22 August 2011 42 July 2011 33 June 2011 41 May 2011 43 April 2011 43 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 399 Corporate 219 Enterprise 390 McAfee Labs 1098 Tags 1 million guarantee access to live fraud resolution agents Acquisition Android botnet Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying

  • Lianne Caetano Blog Central

    Updated: 2011-09-20 20:12:17
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive September 2011 22 August 2011 42 July 2011 33 June 2011 41 May 2011 43 April 2011 43 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 399 Corporate 219 Enterprise 390 McAfee Labs 1098 Tags 1 million guarantee access to live fraud resolution agents Acquisition Android botnet Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying

  • September 2011 Blog Central

    Updated: 2011-09-20 20:12:16
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive September 2011 22 August 2011 42 July 2011 33 June 2011 41 May 2011 43 April 2011 43 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 399 Corporate 219 Enterprise 390 McAfee Labs 1098 Tags 1 million guarantee access to live fraud resolution agents Acquisition Android botnet Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying

  • Moving to a Forum

    Updated: 2011-09-20 20:10:27
    For CSE 484 this year, we have switched from the blog format to the forum format.  The course website is online at http://www.cs.washington.edu/education/courses/484/10wi/.  This year’s forum is online at https://catalysttools.washington.edu/gopost/board/kohno/14597/.  We switched from the blog format to the forum format because forums seem to provide a better opportunity for interactive discussions within the course.

  • Current Event – A Broader Look on Wireless Access Point Vulnerabilities

    Updated: 2011-09-20 20:10:26
    Wireless access points are a great technology – allowing a user the convenience of accessing the same wired network without wires.  But the vulnerabilites and weak points that they produce can often be overlooked.  Most people install these devices to extend their network to laptop or other wireless users, and can be secured if they [...]

  • Current Event : Keyboard hacking (from thin air!)

    Updated: 2011-09-20 20:10:24
    A move over scanning the keyboard with infra-red cameras for heat signatures, listening to keystrokes and simple shoulder surfing. Say hello to hacking through thin air or electromagnetic waves, rather. Apparently, all keyboards generate unique electromagnetic waves for every single key pressed and these are really easy to pick up even with some inexpensive antennae. [...]

  • Security Review: Urban Chicken Coops

    Updated: 2011-09-20 20:10:23
    Chicken coops form the heart of many urban farmers’ livelihoods. Providing sustenance directly through eggs, indirectly through fertilization of soil, and supplementing any waste management system through the digestion of otherwise unusable organic matter, the occupants of these structures play a vital role in small-scale subsistence living. Yet with such a range of assets come [...]

  • Google’s Online Library

    Updated: 2011-09-20 20:10:22
    Google has been scanning whole books and archiving them since at least 2004.  More recently, it settled a lawsuit that will allow it to legally copy copyrighted books and making them available online.  Google allows users to search their book archive at Google Book Search, and view samples or in some cases entire books.  While [...]

  • Security Review: New Weapons in the Fight Against Doping

    Updated: 2011-09-20 20:10:21
    The use of performance enhancing drugs and medical techniques is a serious problem in every sport, but no sport is as notorious for doping scandals as is professional cycling. While Olympic athletes, baseball players, and body builders are often caught boosting, the effect of their “cheating” on the sport, society, and economy is minimal. Marion [...]

  • Security Review: Helios Online Voting

    Updated: 2011-09-20 20:10:19
    The Technology The technology being evaluated is the Helios Online Voting Booth, usable at http://www.heliosvoting.org and outlined in the 2008 Usenix Secuirty paper available at the same site. The election system does not create novel cryptographic tools or algorithms, rather it provides a protocol for using existing cryptography to make an election that is universally [...]

  • Security Review: Online Taxes

    Updated: 2011-09-20 20:10:18
    For the last couple of years, I have done my taxes online.  Compared to doing them by hand on paper, the online method takes far less time to fill out.  However, it also brings with it the host of security risks associated with entering sensitive data over the internet.  To successfully file your tax return, [...]

  • Security Review: Eye-Fi

    Updated: 2011-09-20 20:10:16
    Eye-Fi “The Eye-Fi Card stores photos & videos like a normal memory card. When you turn your camera on within range of a configured Wi-Fi network, it wirelessly transfers your photos & videos. To your computer. Or to your favorite photo sharing web site. Or both.” The Eye-Fi card is an SD memory card used [...]

  • Security Review: Hollywood Awards Presentations

    Updated: 2011-09-20 20:10:15
    Big Hollywood parties have big time guest lists, so it’s no wonder that many people want to be there.  These include both (mostly) benign fans and some people of the less benign variety.  Hence, security at these events is a big deal.  In 2000, the event’s security made national headlines when the oscar statues were [...]

  • How Did You teach Your Kids To Be Safe When They Were Learning To Surf The Internet?

    Updated: 2011-09-20 20:10:10
    Take a few minutes to share your experiences in teaching your kids Internet Safety - and check out what other parents have done

  • Teen Guide to Safe Blogging

    Updated: 2011-09-20 20:10:10
    Larry Magid's open letter to teen age bloggers - and their parents

  • Online Security Tips ebook - with Bonus

    Updated: 2011-09-20 20:10:08
    Vital Security Tools and Tips to Secure Your Computers - Guard Against Fraud and ID theft - includes PC Safety book plus free Resale Rights

  • Family Safety Guidelines for Protecting Our Children

    Updated: 2011-09-20 20:10:08
    Internet safety policies and practical guidelines to help make the Internet safer for children and their families.

  • Internet Security Articles

    Updated: 2011-09-20 20:10:07
    A Library of Free Internet Security Articles and Computer Safety Articles and Reports on Maintaining Your Computer Protection against adware, spyware, vituses and trojan horses

  • Gert Jan Schenk Blog Central

    Updated: 2011-09-19 06:52:18
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive September 2011 18 August 2011 42 July 2011 33 June 2011 41 May 2011 43 April 2011 43 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 397 Corporate 218 Enterprise 389 McAfee Labs 1097 Tags 1 million guarantee access to live fraud resolution agents Acquisition Android botnet Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying

  • Kingsoft Q2 2011 Profit Up 55% YoY

    Updated: 2011-09-17 01:34:54
    August 25, 2011, Kingsoft (HK.03888) released second quarter of 2011 and the interim results announcement. Kingsoft Q2 of 2011 total revenues of 263 million RMB, a QoQ increase of 14%, a YoY increase of 7%; entertainment software and application software, respectively, accounting for 66% and 34%. Among them, the entertainment software business revenues is 173 million, [...]

  • Removing Trusted Certificates from Android

    Updated: 2011-09-15 16:22:55
    In light of all the discussions about maintaining a secure posture on trusted certificates we often times forget about the little guys. In this case I'm talking about our mobile devices. We tend to forget that these devices are just as vulnerable as our desktop/laptops. Unfortunately it's not always easy to manage the certificates on these devices. But if you own an Android device and would like to take a little more control over what your device is trusting read on to find out how you can do it.

  • Summer Promotion - All Kingsoft software products in our Online store Get more discount

    Updated: 2011-09-10 11:03:31
    23th, Sept, 2011 from KSOffice Team For coming Summer Season , Great Worth announce the launch of its 2011 Summer online Sale Campaign for all Kingsoft products! From Sept 10th to Oct 10th , 2011, the promotion will be: 1. Great Worth offer 10% discount for Kingsoft Office 2010, Kingsoft Powerword 2010 in online store. 2. Great Worth offer [...]

  • Kingsoft’s Beike Websites to Use Tencent Search

    Updated: 2011-09-09 11:30:49
    9th, Sept, 2011 from KSOffice Team Chinese software company Kingsoft (3888.HK) has announced that its subsidiary Shell Internet (Beijing) Security Technology (Beike Internet Security Technology), has entered into a supplemental agreement to incorporate Tencent’s (0700.HK) Soso search engine on its websites. The supplemental agreement, which lasts from March 1, 2011 until [...]

  • Credit Card Streaming

    Updated: 2011-09-09 04:41:00
    In the past few years, we’ve seen point-of-service payment card hardware and software capabilities extend from an enterprise level (proprietary systems) to a small business level (financial instutution-backed merchant accounts) and finally to an individual level (web and mobile payments). And it makes sense; despite the growing popularity of e-currency, most people with a bank account [...]

  • Jailbroken Phones and Corporate Access

    Updated: 2011-09-07 04:10:52
    A month ago I posted an article titled Jailbreaking – Unsafe at Any Speed.  That was about the need for companies to have policies against jailbreaking on corporate phones.    Now I find myself in the position of writing policy to allow personal phones to connect to the Good server.   I want to bring the same [...]

  • iPhone Physical Security Tips

    Updated: 2011-09-04 01:00:54
    While working on a personal mobile phone policy for work, I realized that even with the corporate phones, people are pretty much given a phone, patted on the head and told “good luck”.  Not an auspicious beginning. So what do people need to know?  People want to steal your phone.  Crimes of opportunity often happen on [...]

  • Password Generation At Its Most Thorough

    Updated: 2011-09-03 00:00:21
    We all have passwords.  Most of us hate writing a new one for every new account we open.  The traditional thinking always said that for a password to be secure, it was necessarily unwieldy to memorize.  So who wants to memorize vRg5BoTA for your new Spotify account when you just solidified a mnemonic in your [...]

Current Feed Items | Previous Months Items

Aug 2011 | Jul 2011 | Jun 2011 | May 2011 | Apr 2011 | Mar 2011