-
delicious/cdman83
A long overdue “linky” post: Internet Guide | dyn.com Posted: 22 Oct 2009 04:55 AM PDT Dyn (of DynDNS) is also getting in the internet content filtering business. About the Fitbit Posted: 23 Oct 2009 11:10 AM PDT BorderWare ReputationAuthority Posted: 23 Oct 2009 12:09 AM PDT Petabytes on a budget: How to build cheap…
-
Schneier videos
Bruce Schneier is always fun, and together with Markus Ranum he is extra fun (sidenote: although it is title “face-off”, they agree more than they disagree): Schneier-Ranum face-off, part1: The future of information security Schneier-Ranum face-off, part 2: Social networking Schneier-Ranum face-off, part 3: Compliance and security Schneier-Ranum face-off, part 4: Cybersecurity coordinator Schneier-Ranum face-off…
-
New challenges
After missing the announcement for the second part of the Network Forensics Puzzle (yes, I’m subscribed the feed now!) I would like to regain your trust by bringing two other contests to your attention: Miracle on Thirty-Hack Street from ethicalhacker.net the sevenfour challenges (a “keygen-me” type of challenge) Bonus content: t2’09 challenge solutions (via the…
-
A game of Chinese whispers
Yet an other example of real-life Chinese whispers in the security journalism: A Hungarian online news site published an article titled “Hackers tried to steal user data from Amazon” (here is a somewhat usable automatic translation for the non-Hungarian speakers). I assume that the information went like this: What happened –> What the security company…
-
Twitter hacked
It had to happen, didn’t it? I’ve fired up Pidgin with the microblog-purple plugin, only to get an “invalid certificate” error for twitter. I’ve quickly became nervous, since a quick digging indicated that I was getting the wrong IP address for the domain twitter.com. My first thought was: “I’ve been compromised”. After quickly verifying my…
-
Discount Codes UK review
These days most online shops offer the ability to use discount codes at checkout and get a price reduction anywhere from 5% to 50%. These codes are announced in various media (like podcast or blogs), but even if you don’t follow the particular program, it is rather easy to find them with a search engine.…
-
I’m the spam killa’
I’m happy to announce that I’m one of two “spam killers” on the Software Engineering radio website. Spam was starting to run rampant on their site, so they asked for help and I responded. It is so simple to donate your time to a worthy cause. You to can do it, it takes just a…
-
Screenshot forensics
One of the interesting thing I like to do when reading (security) blog posts, is to try to deduce details about the machine setup used. You can find some very interesting tidbits of information, like Sunbelt using Symantec AV on some of their machines. A couple of current examples: a CA researcher uses Office 2007…
-
Plugging a good friend of mine (not in a sexual way! :-P)
A talented photographer with a lot of beautiful images. Check them out below or on his flickr stream. Go OPE!
-
Today’s fudbuster
We begin today’s FUD-buster with – applause please – cyberterorism via an “article”: Cyberterrorism: A look into the future. The article talks about Estonia (which is the poster-child for “cyber” incidents these days) and says the following thing (amongst others equally high-quality content) – emphasis added: “The three-week cyberattack on Estonia threatened to black out…
