You can’t make this stuff up. It really would be interesting to know who’s behind the Sony Breach.

Seriously.  Could you even make these stories up? Sony comes clean.  They admit that 77 million records were compromised. In …

Do Not Assume Your Shopping Carts are Secure

…some of the major shopping cart providers, Amazon, Google and Paypal have software flaws

SecurID Suffers Data Security Breach

RSA, one of the pioneering companies of information security and the creator of SecurID technology in use by thousands of …

Openfire XMPP Chat Server: migrating from windows to linux demystified

Most other chat protocols/services do not use TLS/SSL or it’s optional and off by default, and thus it’s a low-hanging vector for data breach and leakage.

Auto makers have some work to do securing passive keyless entry and start systems

For as little as $100, equipment can be obtained off-the-shelf and configured to sniff the codes used by these automobile systems.

How to avoid having your bank account drained

The only true defense is behavior: not clicking, not opening, etc.

your best offense: a solid defense

your best offense: a solid defense

In the words of some great football coach, your best offense is a solid defense. And so it goes with computer systems security…

your datacenter, your software as a utility

your datacenter, your software as a utility

By ‘utility’ we mean you get all the benefits of the service, without investing in and maintaining the infrastructure.

Hacktivists and ‘the Professionals’ should make 2011 quite interesting

From Hacktivists to ‘the Professionals’, DDoS attacks are a major tool. And detailed DDoS discussion: Tweet

2011: expect more of using social media for hacktivism

2011 will be the year of using old attack vectors in new web 2.0 ways. DDoS with social media? Browser-only …