Markets are powerful things. Look at how eBay changed the world by creating a market for old stuff.
Richard Stiennon delivers a timely, succinct exploration of cyber threats, hack attacks, crime on the web, and information warfare.
The perception, thanks to the history of virus writers, that cyber criminals are young hackers holed away in hovels in Romania is not entirely accurate. As a matter of fact that perception is rapidly becoming totally wrong.
I recorded this podcast last Friday but have not had a chance to post it until now as I have been traveling. I am writing in the lobby of the Berjaya Langkawi resort in Malaysia.
I had some time last week to think ahead a bit. I was on a twelve hour round trip flight to Maui just to get frequent flier points with Northwest.
I see that some universities are still struggling with Security 101. The breach last week of UCLA's computer systems by hackers is a case in point.
There is a line between IT security and physical security. Many of the big consulting firms and integrators would like you to think it is a fine line.
I just spent nine months as an independent analyst covering the IT security space. You will have noticed that in addition to posting about the threats and rise of cyber crime I began to cover the security industry as well.
You may have caught my recent column on good vs bad NAC here. To dig a little deeper into the good side of NAC that is the network access control stuff as opposed to the admission control stuff, I talked with Sanjay Uppal, Founder and CEO of Caymas Systems.
SCADA is of course the protocol that utilities such as gas, electric, and telecoms use to control the equipment they have to manage. Think of a simple way to check a temperature or voltage reading and report back as well as set values on switches, pumps, etc.
Don’t get excited. That is the news I was hoping to hear out of the leading software firewall vendor.
Last week I caught up with DerEngel, the uber cable modem hacker, in his home in Hong Kong. He has just published his first book, Hacking the Cable Modem, and we had an opportunity to talk about the book as well as his life work, hacking cable modems.
The only time I have been a victim of identity theft (that I know of) was the time I took a couple of visiting Japanese engineers out to dinner at ChiChi's restaurant in Ann Arbor, Michigan. It was 1983 and I discovered the theft when I got my monthly bill and it told the story of a spending spree from the strip clubs of 8 Mile Rd.
A huge chunk of Europe was without power for two hours Saturday, including Paris. Evidently it was sparked by an "overload" in Northwest Germany.
Can a firewall do leak prevention? In putting together an upcoming webinar this question was put forward.
This is day to celebrate for anyone who has battled the ugly intrusive practices of 180Solutions and its affiliates. The FTC just announced that Zango (180) has settled with them for $3 million and will cease to distribute their software.