Fake tech reps calling, (Fri, Mar 30th)
Updated: 2012-03-30 22:38:53
Fake Anti-Virus isn't enough, now we also have to contend with fake Microsoft reps! This scam has ...(more)...
In part two of this article about Securing Windows desktops, the author discusses endpoint firewalls, data protection, and whitelisting of applications as to make sure that readers are fully aware of the capabilities and limitations of each security solution.
via lh6.googleusercontent.com Ouch. Posted via email from danielmiessler.com | posterous Related ContentDucks in WaterThe First Result When Googling SantorumYouTube Downloader | Chrome Web StoreWho the Hell is AirSage?The Happiness Process
via blogs.discovermagazine.com Bible: 0, Universe: 1 Posted via email from danielmiessler.com | posterous Related ContentTry a BookThis is my Favorite PictureA Digital IO WorkflowInteractive Animation Brings Starry Night to LifeBrowser Combat
In addition to bringing you the latest in AppSec research and news in this blog, we will begin presenting short educational briefings on key subjects within the application security space. We hope you will enjoy and learn from these short posts. We value your opinion, so please let us know if there are any concepts [...]
It has been roughly a year since we released our original paper titled “In Configuration We Trust.” The goal of that research was to try to draw awareness to the fact that a lot of security improvement can be made simply by how you architect your network and configure your operating systems and applications. These [...]
Verizon just released its 2012 Data Breach Investigative Report which contains findings contributed by global agencies such as the U.S. Secret Service, the Dutch High Tech Crime Unit, the Irish Reporting and Information Service, the Australian Federal Police and the London Metropolitan Police. I thought it would be good to put together a quick summary [...]
Chris Wysopal recently authored an article detailing static analysis that was featured in The Testing Planet. “What is Static Analysis?” provides a comprehensive and in depth yet understandable explanation of the ins and outs of static testing. Using graphics and examples of code, Chris begins with the loading phase and travels through the Application Modeler, [...]
eEye has always taken a “zero gap” approach to our threat management product strategy. That thinking has been the driver for our market firsts in support for new technologies such as cloud, mobile, and virtualization vulnerability management. These new technologies bring tremendous benefits, but they also bring risks with them as well, which must be [...]