Securology

(noun) securology. Latin: se cura logia
Literally translated: the study of being without care or worry

Thursday, June 26, 2008

Breaking Cisco VPN Policy

›
I am surprised how often I hear an organization operate under the belief that they can really, truly can control what a remote client does u...
2 comments:
Friday, May 23, 2008

PCI Silverbullet for POS?

›
Has Verifone created a PCI silverbullet for Point Of Sale (POS) systems with their VeriShield Protect product ? It's certainly interesti...
8 comments:
Saturday, May 17, 2008

Why You Don't Need a Web Application Layer Firewall

›
Now that PCI 6.6's supporting documents are finally released , a lot people are jumping on the "Well, we're getting a Web Appli...
1 comment:
Saturday, May 10, 2008

Sending Bobby Tables to the Moon

›
NASA has a program where you can send your name to the moon . Just give them your name, they'll store it electronically, and send it o...
4 comments:
Saturday, May 3, 2008

Automating Exploitation Creation

›
Some academic security researchers at Carnegie Mellon have released a very compelling paper which introduces the idea that just monitoring ...
Tuesday, April 15, 2008

PCI 1.1 Section 6.6

›
If you're one of the many practitioners waiting to see how the PCI Security Council clarifies the ambiguous 6.6 requirement, then you ma...
2 comments:
Friday, March 21, 2008

University of Washington's Computer Security Course

›
Tadayoshi Kohno, a Computer Science Professor at the University of Washington, is teaching an undergraduate computer security course with a...

More Broken DRM

›
From Slashdot : "In July 2007, Richard Doherty of the Envisioneering Group (BD+ Standards Board) declared : 'BD+, unlike AACS wh...
Saturday, March 8, 2008

Anderson Proves PIN Entry Devices are Insecure

›
If there is a theme in good security research right now, it's that we cannot trust hardware. Ross Anderson and company at the Computer...
Friday, March 7, 2008

Jon Callas Responds to Ed Felten

›
It's nice to not be on the top spot of Jon Callas' "CTO Corner" anymore ... although I held that spot for four and a half...
2 comments:

Excellent Cold Boot Step-By-Step

›
News.com has an excellent step-by-step complete with pictures detailing what it takes to steal the encryption keys for Apple's File Vaul...
Thursday, February 21, 2008

Felten Destroys Whole Disk Encryption

›
Ed Felten and company publicized some research findings today on a form of side-channel attack against whole disk encryption keys stored ...
4 comments:
Tuesday, February 19, 2008

Websense CEO on AV Signatures

›
Websense CEO, Gene Hodges, on the futility of signature based antivirus , just an excerpt: On the modern attack vector: Antivirus software ...
Thursday, February 14, 2008

Localhost DNS Entries & "Same Site Scripting"

›
I'm not a big fan of new names for variations of existing attacks, but Tavis Ormandy (of Google ) has pointed out an interesting way to...
Friday, February 1, 2008

WiKID soft tokens

›
I promised Nick Owens at WiKID Systems a response and it is long overdue. Nick commented on my " soft tokens aren't tokens at all...
2 comments:
Wednesday, January 30, 2008

Two Words: Code Quality

›
Dr. Brian Chess , Chief Scientist at Fortify and static analysis guru , has a couple very interesting posts on the company blog: one on the...
Monday, January 28, 2008

F-Secure's Academic Malware Analysis Course

›
I would like to see more like this from security vendors/service providers in industry: F-Secure has created a malware analysis course at th...
Tuesday, January 15, 2008

Targeted Bank Malware

›
There have been a lot of interesting things going on with malware these days, but this is on the top of the list (for the next few hours any...
19 comments:

Trust is a Simple Equation

›
[ Begin rant ] OK. If security vendors don't get this simple equation, then we might as well all give up and give in... If you don...
5 comments:
Wednesday, January 9, 2008

MBR Rootkits

›
There is a new flurry of malware floating around in the wild : boot record rootkits (a.k.a. "bootkits"). Yes, for those of you o...
5 comments:
‹
›
Home
View web version
Powered by Blogger.