Bruce Schneier is Wrong on Data Mining
Bruce Schneier of counterpane considers himself an expert on all things related to computer security, and is the CTO of
Read MoreI can't believe that came from your mouth!
All-things related to Cyber Security
Bruce Schneier of counterpane considers himself an expert on all things related to computer security, and is the CTO of
Read MoreThe Register has a great story that talks about how phishers are getting around the ever vigilant groups that keep
Read MoreIts bad enough they make you fill out all that tax paperwork to prove that you paid your taxes. Its
Read MoreThe propellor-heads at Carnegie Mellon are sniffing around for more tax dollars, and this time, it is to create a
Read MoreUS-CERT, the cyber division of the Department of Homeland Security introduced 4 posters today with the hopes that businesses will
Read MoreYesterday, I blogged about how McAfee was screwed over by their own auditing company that they hired to make sure
Read MoreAn auditor from Deloitte and Touche (or is it Toilet and Douche?) left a CDROM in the seat pocket on
Read MoreA botnet herder that goes by the handle of “0x80” wanted to brag about his “l33t sk1llz” to a Washington
Read MoreSeems like a light sentence to me for breaking into a system that houses such critical information. I think this
Read MoreAn article referenced by Drudge talks about Cyber-Bullies and online safety. What caught my attention, of course, is the bit
Read MoreAn Olympic Gold Medalist is hailed on television as being an entrepreneur and a millionaire, who split his time between
Read MoreA British Hacker, dope smoker, and conspiracy theorist who hacked into US military and scientific computers in a vain effort
Read MoreDon’t know why no one really thought of this before. A company has created a series of automated bots that
Read MoreIn a post yesterday, I guessed that Walmart may be involved somehow in a current investigation into the theft of
Read MoreThe FBI is on a case dealing with a probable security breach that has led to the compromise of hundreds
Read MoreThe National Cyber Security Division (NCSD) just completed its simulations today, running attack scenarios against common internet services and specifically,
Read MoreBack in 2003, Microsoft purchased a Romanian Anti-virus company called GeCAD. When that happened, AV companies like Symantec, McAffee and
Read MoreWell, our friends at EFF, the Electronic Frontier Foundation, are back again and still trying to endanger the lives of
Read MoreThe Credit card information of its users! Hackers and identity thieves lust after lists of credit cards like this. Instead
Read MoreI am in Raleigh NC at the Triangle Research Park facility of Cisco Systems. After two days of demonstrations of
Read MoreThe 9th Circus Circuit Court of Appeals got it right today. They told a Liberal Activist, and co-founder of the
Read MoreThere are only about three games in the information security world if you are a bad guy- You either sell
Read MoreAccording to the Register, China attempted to exploit a Zero-Day exploit in the Windows MetaFile vulnerability by sending HTML encoded
Read MoreAnd are they using Bluetooth to pass docs?Looking at the picture, it looks like a Pocket PC type of a
Read MoreThe Democrats want to hamstring the law enforcement agencies of this country by killing parts of the USA Patriot Act,
Read More