Quantcast
Channel: informationsecurity
Browsing all 19 articles
Browse latest View live

WARNING: Major new Windows virus

Sorry to be off-topic, but I just wanted to give everyone a head's up about the nasty Windows "WMF" malware/virus that is hitting the internets hard this week. It may turn out to be one of the worst...

View Article



Update on the Windows security flaw

The widely-reported flaw in how .WMF files are handled by Windows operating systems (and third-party software) may be less serious for some Windows users than originally thought. E-week's Larry Seltzer...

View Article

WMF Windows Virus: Official MS Patch

As mentioned in my previous diary announcing the Windows WMF virus, I am following up to let everyone know that Microsoft has released its official patch:Security update for WMF vulnerability...

View Article

Spying, NSA and TIA with a twist

What are you most worried about?  Bird flu, global climate change,overpopulation or how about an earth magnetic pole reversal.  We studied these and other disaster scenarios in business school.  These...

View Article

Some Good from NSA Wiretapping?

As an IT professional, even an unemployed one, every day I still ask myself one question more consistently than any other: "Why don't people seem to care about security?" People sign up for accounts on...

View Article


Winning the Big Game is What Matters

Crossposted at MyDDReading Reaper0bot0's diary tonight reminded me very much of all the Internet Security debates I have been involved with since the early nineties.  I invented one of the early...

View Article

As finance roils, don't neglect information security

As finance roils, don't neglect information securityWhile the world eyes the valuation meltdown in financial services, don't neglect the danger to regulated systems and data.  The pitfalls of...

View Article

'Positive Thinking' drove this mess - Ehrenreich is correct

Barbara Ehrenreich is right on point in discussing the irrational optimism that has dragged us off the cliff.  She opines in NY Times (link & excerpts below) about the absolute failure of our...

View Article


Waves Turn Rocks to Sand.  Make Waves!

A Web-Based Proxy Server Is As Safe and Useful As a Frontal Lobotomy!by Kevin M. Nixon, MSA, CISSP, CISMOpen, anonymous web based proxy servers may be honeypots to steal your information, or may be an...

View Article


Information Security Breaches = Lurking Homeland & Financial Security Threat

Dustbowl Observer posted a great diary on the most recent and massive breach of our personal information.Databreach: Consumers get screwed againIf you care about the fallout of infosec breaches, you...

View Article

Parking Ticket Leads to PC Virus Attack

Firewalls. Corrupted files. Spam with bad code.  Those were the traditional vectors hackers used to plant malware on a system or gain access to a workstation. Now they just give you a parking ticket....

View Article

Ten Things Government Can Do To Create Jobs

The most annoying arguments against doing anything about joblessness are usually rooted in fatalism.  This perspective argues that whatever social force is destroying jobs is ‘inevitable’ and all we...

View Article

The lulzboat sails far and wide

I haven't seen this posted on DKOS anywhere, so I'm posting it. Hopefully it will be of interest to techies and non techies alike. This being a first time posting a diary, I hope you'll be gentle....

View Article


The WikiLeaks Brouhaha: Shooting the Messengers and Ignoring the Elephants,...

Part 1 of this series revisited Pfc. Manning's activities at Forward Operating Base Hammer with a focus on indicators that provided information about the level of oversight and risk management with...

View Article

The Wikileaks Brouhaha: Shooting the Messengers and Ignoring the Elephants,...

In Part 2, we looked at the security environment at FOB Hammer and discovered that there was effectively none. That was the first component of the "perfect storm" that enabled Pfc. Manning to collect...

View Article


The WikiLeaks Brouhaha: Shooting the Messengers and Ignoring the Elephants,...

So far in our story, we have focused on the role of the Department of Defense in facilitating Bradley Manning's opportunity to acquire and export so much classified information. In Part 4, we will...

View Article

Spying on Webcams: GCHQ Edition

The Grauniad reports that, according to the Snowden documents, the GCHQ has been naughty indeed, tapping into webcam chats and saving images in bulk.

View Article


Enraged by all of these data breaches? Wonder why?

Well, it's a bit complex. Some businesses, such as Home Depot, decided "We sell hammers" and out of ignorance, fell prey to criminals. Other businesses calculate, with business rationale, their risks,...

View Article

How a friend was doxed

I was on a friend's blog site today, commenting on on his blog entry and he asked me in the comments how some folks got a great deal of his personal identifiable information (PII in the trade). He is...

View Article
Browsing all 19 articles
Browse latest View live




Latest Images