Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

4
comments
HITECH, breaches, and a little sunlight
A good article in InfoSecurity on May 5th on the HITECH act got me thinking (as good articles should) about health records, security, and well, all things HIPAA-ish. I certainly agree with much of what was said, and I think it’s clear that the pressure is ramping up rapidly to not only comply ...
Posted 13 May 2010 by Geoff Webb
0
comments
eSoft researchers have been tracking a recent campaign abusing Google Groups to spread malicious links in Spam emails. Users following the link are infected with a Downloader Trojan, silently infecting the machine with various types of malware including Rogue Anti-Virus. The scam starts with an e ...
Posted 12 May 2010 by Rick Robinson
1
comment
Looking back at Infosecurity Europe 2010
Late April was highlighted by my first trip to Infosecurity Europe in London. While I understand that this event received its fair share of criticism in the press for being past its prime, there were certainly aspects of the conference that made it worthwhile to attend. (In all fairness, I must disc ...
Posted 10 May 2010 by Drew Amorosi
0
comments
Pharma-Fraud Continues to Dominate Spam
Have you taken a look inside your Spam folder recently?  Without a doubt you’ll find the folder full of pharmacy Spam, pitching everything from Cialis and Viagra to Vicodin and Hydrocodone.  The problem is almost none of the linked web sites are legitimate certified pharmacies. Ph ...
Posted 22 April 2010 by Rick Robinson
0
comments
I recently came across a paper called Shadows in the Cloud, which is actually a follow-up report of Tracking GhostNet: Investigating a Cyber Espionage Network, an investigation of the attacks on the office of the Dalai Lama and some governmental bodies. The report is written by two bodies who had th ...
Posted 21 April 2010 by Roger Halbheer
0
comments
Tiger Woods (Searches) Not to Be Trusted
Tiger Woods’ personal life and marital affairs have attracted constant attention from the press and has certainly damaged his public reputation.  With his return to the Masters, Nike has released a new commercial in an effort to rebuild Woods’ image.  This compelling commer ...
Posted 08 April 2010 by Rick Robinson
2
comments
What happens when you offer up money to anyone who can drive traffic to your website? Hackers, scammers, spammers and fraudsters come to your aid. That’s the case with online movie site zml.com, which offers 30% of each sale and 5% of rebills paid via anonymous means to anyone who re ...
Posted 05 April 2010 by Rick Robinson
0
comments
I blogged on Day 1 and Day 2 but as I expected, I was unable to blog yesterday on the conference. However, let me just briefly give you my impression of the final day: The core part of this last day was a whole block on Cloud Computing. There were different presentations on the subject and then a p ...
Posted 26 March 2010 by Roger Halbheer
1
comment
And the second day starts. I just met with Jeremy Kirk from IDG and it is great to see that the press is actually interested in such a conference as well. The day today started with a long session on different initiatives against cybercrime. A lot of good information: Interpol offers quite s ...
Posted 24 March 2010 by Roger Halbheer
0
comments
As you saw from previous posts, I am at the Octopus Conference on Cooperation against Cybercrime at the moment. We had yesterday the Deputy Secretary General of the Council of Europe and one of her key statements was that different bodies (like the Council of Europe, UN etc.) should not compete. The ...
Posted 24 March 2010 by Roger Halbheer
0
comments
A few years ago, the Budapest Convention on Cybercrime was signed within the Council of Europe. Since then it was ratified all across the globe by a lot of countries or at least used as the base for legislation. The Council of Europe is organising a conference on Cooperation against Cybercrime, call ...
Posted 23 March 2010 by Roger Halbheer
0
comments
The first week of March Madness has brought about many compelling stories, with a good deal of upsets and bracket busters. The most newsworthy of these has been the University of Northern Iowa’s ousting of #1 overall seed Kansas. This ‘Cinderella’ story has deservedly gotten a grea ...
Posted 22 March 2010 by Rick Robinson
0
comments
Results of Operation b49 (Botnet Takedown)
On February 24th we announced the work we did on taking down Waledac – read Tim Cranton’s blog post called Cracking Down on Botnets. Now it is time to look back and try to understand what we learned so far. Sudosecure traces the Waledac infection and gives a good view of new infect ...
Posted 20 March 2010 by Roger Halbheer
0
comments
You know that I am not a big fan of the requirement for having all Internet users authenticate strongly. There are people in the security arena who think that this is the only way to fight cybercrime – and in parallel accept that they would kill freedom of speech. I recently had a good discus ...
Posted 17 March 2010 by Roger Halbheer
1
comment
Insider Threat of Cloud Computing
Tonight I got this article forwarded to me: Afraid of outside cloud attacks? You're missing the real threat. David Linthicum (the author) claimed that if you are looking at the hackers attacking “your” cloud from the outside, you are missing the real problem as the insider threat is ...
Posted 11 March 2010 by Roger Halbheer
0
comments
Data Protection Heat Map
I was looking at some research done by Forrester, which could be interesting for you as well. They try to lay out the landscape with regards to data protection for you and it looks fairly compelling. So if you are interested in the situation of the different Privacy laws across the globe and how For ...
Posted 09 March 2010 by Roger Halbheer
1
comment
Our EMEA Security Program Manager, Henk van Roest, started this series internally and with his consent I am publishing it here in my blog as I think it contains a lot of great information for you to use. So far, in the first 4 chapters, we have addressed the usual excuses for not Managing Your IT ...
Posted 06 March 2010 by Roger Halbheer
0
comments
The eSoft Threat Prevention Team is warning customers today of a new email scam circulating very quickly.  These fraudulent emails claim to be from Google Staffing, Hallmark, Twitter as well as other social networks and legitimate businesses. The email persuades the user to open the attached ...
Posted 05 March 2010 by Rick Robinson
0
comments
As you all know, I have two main pet themes: Risk Management and Compliance Management as I see very often that there is room for improvement when it comes to such processes within our customers. Internally, we often think about how we can make it easier for our customers to manage compliance in the ...
Posted 18 February 2010 by Roger Halbheer
2
comments
I just worked my way through the list SANS published. Looking at the list it is not surprising but scary to see which errors made it to the top of the list: Cross-site Scripting SQL Injection Classic Buffer Overflow Cross-Site Request Forgery Improper Access Control It ...
Posted 17 February 2010 by Roger Halbheer
Showing 441 - 460 of 520 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×