Why Flame is Lame, (Thu, May 31st)
Updated: 2012-05-31 17:55:02
We have gotten a number of submissions asking about Flame, the malware that was spotted ...(more)...
Every week it seems like there is a new story about a popular website or application having privacy issues that put its users at risk. With millions of apps receiving billions of downloads, it is important users are aware of the risks that they face when downloading and using apps. This infographic uses real world cases to outline the threat to user privacy posed by mobile apps.
Stop me if you’ve heard this one before: there is a new piece of malware and this one is even worse than the last one. It is bigger, scarier, more complex and will take years, according to some estimates, to actually ever know what the malware really does. And of course it already has a [...]
As he shows, America is both especially unequal and has especially low mobility. But he also argues that because we are even more unequal now than we were a generation ago, we should expect even less social mobility going forward. via krugman.blogs.nytimes.com An interesting system for estimating social mobility based on parental income at a [...]
Over the past several weeks, Veracode Director of Marketing Fergal Glynn has been authoring a series on application security for security news blog Threatpost. Titled “A CISO’s Guide to Application security,” the five-part series focuses on defining application security, outlining the elements of a comprehensive appsec program, educating about application and software related risks, determining the true cost of a data breach, and providing recommendations to CISOs for managing enterprise-level appsec. Now that the series has come to a conclusion we have highlighted each post below along with links to the full articles.
Did you know that during the course of this year, the number of Wi-Fi connected devices will exceed the world’s population? This incredible statistic highlights the ubiquitous nature of Wi-Fi. However, the convenience of having public Wi-Fi available practically everywhere comes at the cost of greater risk to users. This infographic delves into the anatomy of a Wi-Fi hack and simple precautions Wi-Fi users should take to ensure that they are surfing safely.
Posted via email from danielmiessler.com | posterous Related Content4S FlowerFlowers and StoneCrescent Tree Shadows from EclipseOverlooking SFCouldn’t Care Less
Posted via email from danielmiessler.com | posterous Related Content4S FlowerStudent FailFlowers and StoneOverlooking SFCouldn’t Care Less
Happy Friday all, and I hope everyone had a great week. Here are the top headlines from this past week in the security world. Enjoy! Cyber Security Index: “Cyber Security Index Highlights Political Threats, Business Partner Risk” by Paul Roberts (@paulfroberts). This article from Threatpost looks at this year’s Index of Cyber Security score of [...]
In this, our third and final interview segment with Dan Guido, Co-Founder and CEO of Trail of Bits, Dan talks about how organizations should prepare to face security threats, and attack vectors that pose the greatest threat to enterprises today. Watch the interview.
It keeps happening over and over again. I speak to a prospect, and they do not want yet another vulnerability report with pages and pages of assets and vulnerabilities. Every tool vulnerability assessment scanner can produce this with various degrees of customization and consolidation but a 1,000 page report for a few dozen assets doesn’t [...]
When a marketing buzz word sticks like BYOD (Bring Your Own Device), it is inevitable to see it everywhere in an effort to capitalize on the momentum; blogs, literature, SEO, social media, etc. In the past, we have seen great terms like “ecosystem”, “framework”, and my personal favorite “distributed computing”, rise and fall in marketing. [...]