Wine, a popular emulator for Linux and other operating systems that allows you to install and run Windows applications, informed account holders today via e-mail that its database has been compromised through phpMyAdmin. … [Read more...]
Emerging Cyber Threats Report 2012 Published
From the Georgia Tech Cyber Security Summit 2011, comes the Emerging Cyber Threats Report 2012. Along with Microsoft's Security Intelligence Report earlier, today is chalking up to be quite a day for cyber security. The Georgia Tech Cyber Security Summit is put on by the Georgia Tech Information Security Center. In the past year, we have seen a dramatic increase in the … [Read more...]
Internet Story
Here's a modern day thriller for you. It's told in bits and pieces of stories, video clips, and news reportings. http://vimeo.com/13780892 After you watch the video above, the following links might be of interest to you. http://al1ninegrandquest.angelfire.com/ http://www.youtube.com/user/fortress Ooo-eee-ooh! … [Read more...]
Microsoft Releases Security Intelligence Report v11
The report released today analyzes software vulnerabilities and exploits, malicious code threats, and potentially unwanted software from January to June 2011. The report is 168 pages long though that includes several appendices, a glossary, and other tabled information. It is full of easy to read information, pie charts, and line graphs that reveal trends in the first half of … [Read more...]
Book Review: Preventing Good People From Doing Bad Things
The Principle of Least Privilege is an IT security basic. Unfortunately, its implementation is often left out from organizations. The principle of least privilege states that an individual should only have as much access as needed in order to perform their job. Preventing Good People From Doing Bad Things - Implementing Least Privilege by John Mutch and Brian Anderson discusses … [Read more...]