• O2 phishing emails pose as network disruption apology

    Updated: 2012-07-31 11:31:55
    Phishers have taken advantage of the network disruption suffered by the O2 mobile network earlier this month.

  • "Almost every Android device is compromised" turns out to be only almost true

    Updated: 2012-07-31 07:09:28
    A security expert recently made an astonishing claim at a North American security event: one in three Android apps is malware-infected, and almost all devices are compromised. Sounds like terrible news for Android users - but is it true?

  • UnSteveDorkland Twitter spoofer accused of hacking newspaper group

    Updated: 2012-07-31 01:15:59
    Whoever runs the spoof Twitter account is facing four criminal charges for poking fun at a UK newspaper group's executive.

  • Team Poison hacker jailed over Tony Blair security breach

    Updated: 2012-07-30 17:39:24
    A teenage hacker who stole private information belonging to former British Prime Minister Tony Blair, and clogged up the UK's national anti-terrorism telephone hotline, has been jailed for six months.

  • Fake Groupon discount emails carry malware

    Updated: 2012-07-30 14:13:43
    Cybercriminals have spammed out malware, attached to emails claiming to be related to discounts for offers on Groupon.

  • Google in trouble with UK ICO over Street View data - again

    Updated: 2012-07-30 01:53:44
    Google has admitted that it still has some Street View data that the UK Information Commissioner's Office told it to get rid of in 2010.

  • Where are the Safari security updates for Windows and Snow Leopard? Users left exposed

    Updated: 2012-07-30 01:09:42
    Apple released Safari 6 as part of its new Mac operating system, OS X Mountain Lion, as well as a version for Lion that fixes a whopping 121 security vulnerabilties. But what about Windows and Snow Leopard? It seems Apple is leaving users of them behind.

  • Podcast 4

    Updated: 2012-07-29 23:09:10
    This week’s podcast uses a new Mic and I’m getting used to recording to a hardware device instead of directly into audacity.   The levels are low this week.   Next week I should have that corrected. This weeks topics include WPAD The default configuration setting everyone forgets to turn off that had a part in the [...]

  • Gillian McKeith's website seems to love spam

    Updated: 2012-07-27 14:00:18
    The website of controversial TV nutritionist Gillian McKeith has been compromised by hackers, who are using it as a staging post in their spam activities.

  • Happy System Administrators Day

    Updated: 2012-07-27 06:46:58
    This week’s podcast uses a new Mic and I’m getting used to recording to a hardware device instead of directly into audacity.   The levels are low this week.   Next week I should have that corrected. This weeks topics include WPAD The default configuration setting everyone forgets to turn off that had a part in the [...]

  • Tampa Bay Bucks iPad Trend

    Updated: 2012-07-25 02:35:25
    Last fall, I wrote about the Baltimore Raven’s embracing of the iPad as a tool allowing for players to more easily learn their assignments on plays.  It is also used for film study of opposing teams. A new coaching regime at the Tampa Bay Buccaneers becomes the first team known to reverse course and return to bulky [...]

  • File Attachments, Security Awareness and Sophos

    Updated: 2012-07-24 05:01:12
    “We’ve done a pretty good job about teaching people not to open executable attachments in their email”, claims Sophos’ Chet Wisniewski in a recent YouTube video educating users about the dangers of PDF files. I nearly fell out my chair.   I took that as a general statement about Information Security and users.   While it may be [...]

  • Podcast3 – Securing the Home Network

    Updated: 2012-07-22 23:29:46
    This week’s episode of Roger’s Infosec Podcast discusses “Securing the Home Network.” Access Points PCs Mobile Devices. In a follow-up episode, we’ll discuss things to watch for when your online.   This episode focuses on things you should do with your computing devices.  

  • Yet Another Aitel Security Awareness Response

    Updated: 2012-07-21 01:41:53
    Users will click yes to anything, just so they can do what they want.   So it is easy to socially engineer them into saying yes to any prompt, oblivious that they are allowing malicious code to run.  As a result, security awareness training starts to feel like the fun police.   “Don’t run with scissors!”   “Don’t [...]

  • Microsoft Office 2013 is released!

    Updated: 2012-07-19 05:38:33
    18th, Jun, 2012 from KSOffice Team Recently, Microsoft Office 2013 showed its new features and interface, it owns word、PowerPoint、Excel、Outlook、OneNote、Access、Publisher and Lync. First of all, Word looks fresher and cleaner than previous. Except the overall changes, Word provides full screen reading mode and so can support the scaling of the most important thing, then users can directly enter [...]

  • Comments

    Updated: 2012-07-18 03:47:57
    I get frustrated when I’m at other websites and they have commenting systems that only allow comments from authenticated users. I was over at another website, and they had a Microsoft bashing headline that didn’t match the article. I figured it was worth a comment, but my choices were Twitter, Facebook, Google+ and Discuss. Facebook gives [...]

  • Podcast2

    Updated: 2012-07-15 23:00:32
    Here’s the second episode of Roger’s Infosec Podcast This week: Microsoft patch Tuesday for July 2012 Microsoft certificates changes Windows 7 Sidebar/gadgets Passwords (what else) Symantec Antivirus / Endpoint Protection BSOD

  • Yahoo Voice Hack nets 450k passwords

    Updated: 2012-07-13 02:53:14
    A hacking crew D33D posted the results file of a Yahoo hack containing 450 thousand email addresses and passwords.   The hack is believed to be a SQL injection attack performed on a Yahoo Voices server.   The hackers claim this is but one of many security flaws in Yahoo’s services. Yahoo reports that this is an [...]

  • Password Breach

    Updated: 2012-07-13 01:30:53
    At a certain point, it seemed like everyone on the Internet had their personally identifiable information stolen ten times over. Now the “in” breach is password databases.  Unlike stolen personally identifiable information (PII), we often get to try out our john/hashcat/saminside skills as we chortle over the bad passwords users pick. If you don’t know your password [...]

Current Feed Items | Previous Months Items

Jun 2012 | May 2012 | Apr 2012 | Mar 2012 | Feb 2012 | Jan 2012