skip to main
skip to sidebar
View my complete profile
My Blog List
Schneier on Security
Friday Squid Blogging: Hoax Squid-Like Creature
The weird squid-like creature floating around Bristol Harbour is a hoax. As usual, you can also use this squid post to talk about the security stories in...
19 hours ago
Google Online Security Blog
Internet-wide efforts to fight email phishing are working
Posted by Elie Bursztein, anti-abuse research lead and Vijay Eranti, Gmail anti-abuse technical lead Since 2004, industry groups and standards bodies have ...
1 day ago
Network Security Blog
Everyone’s moving to PFS
Last month I wrote about Perfect Forward Secrecy (PFS) for the Akamai corporate blog. But if you’d asked me two months earlier what PFS was, you would hav...
2 days ago
You should care about the EU Data Protection Regulation
It can be easy for an Information Security professional to watch the ongoing debate over Europe’s pending Data Protection Regulation with a skeptical eye. ...
2 weeks ago
Linux Covert Channel Explains Why NSM Matters
I just read a post by Symantec titled Linux Back Door Uses Covert Communication Protocol. It describes a new covert channel on Linux systems. A relevant e...
3 weeks ago
Verizon Business Security Blog
Weekly Intelligence Summary Lead Paragraph: 2013-05-03
And some week’s the bear gets you. Fifty million or so users of LivingSocial have been resetting their passwords following a data breach. But they have co...
7 months ago
Society of Payment Security Professionals - Compliance Demystified
No Future Posts
After nearly 4 years we have decided to end of life the PCIAnswers Blog and Forum. While there will be no further posts we will leave the existing posts av...
3 years ago