Browsing All Posts published on »March, 2013«

Production-ready ZFS offers cosmic-scale storage f…

March 31, 2013

1

Production-ready ZFS offers cosmic-scale storage for Linux bit.ly/11XeSm8

ATM skimming comes to non-ATM payment terminals in…

March 31, 2013

3

ATM skimming comes to non-ATM payment terminals in train stations, etc bit.ly/YUf8f9

From: Digital Bond’s SCADA Security Portal – Friday News & Notes

March 31, 2013

Comments Off on From: Digital Bond’s SCADA Security Portal – Friday News & Notes

a quick re-post from Digital Bond's SCADA Security Portal http://www.digitalbond.com/blog/2013/03/29/friday-news-notes-69/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+digitalbond%2FoLPM+%28Digital+Bond%29 Friday News & Notes by Dale Peterson A NATO research team of experts has determined that Stuxnet was an act of war. “Acts that kill or injure persons or destroy or damage objects are unambiguously uses of force.” The use of force is only allowed in […]

From: Securosis Highlights – Friday Summary: March 29, 2013

March 31, 2013

Comments Off on From: Securosis Highlights – Friday Summary: March 29, 2013

a quick re-post from Securosis Highlights https://securosis.com/blog/friday-summary-march-29-2013 Friday Summary: March 29, 2013 by (author unknown) Our last nine months of research into identity and access management have yielded quite a few surprises – for me at least. Many of these new perspectives I have shared piecemeal in various blogs, and others not. But it occurred […]

From: Securosis Highlights – Defending Cloud Data: How IaaS Storage Works

March 31, 2013

Comments Off on From: Securosis Highlights – Defending Cloud Data: How IaaS Storage Works

a quick re-post from Securosis Highlights https://securosis.com/blog/defending-cloud-data-how-iaas-storage-works Defending Cloud Data: How IaaS Storage Works by (author unknown) Infrastructure as a Service storage can be insanely complex when you include operational and performance requirements. First you need to create a resource pool, which might itself be a pool of virtualized and abstracted storage, and then you […]

From: Securosis Highlights – DDoS Attack Overblown

March 31, 2013

Comments Off on From: Securosis Highlights – DDoS Attack Overblown

a quick re-post from Securosis Highlights https://securosis.com/blog/ddos-attack-overblown DDoS Attack Overblown by (author unknown) Sam Biddle at Gizmodo says: This guy, Prince said, could back up CloudFlare’s claims. This really was Web Dresden, or something. After an inquiry, I was ready to face vindication. Instead, I received this note from a spokesperson for NTT, one of […]

From: The Mac Security Blog – What to Do if Your iPhone Gets Stolen

March 31, 2013

Comments Off on From: The Mac Security Blog – What to Do if Your iPhone Gets Stolen

a quick re-post from The Mac Security Blog http://www.intego.com/mac-security-blog/what-to-do-if-your-iphone-gets-stolen/ What to Do if Your iPhone Gets Stolen by Lysa Myers Theft is a lame and unfortunate risk of living in close proximity to other humans. In the case of iPhones, it’s a growing problem. But there are things you can do to make the theft […]

From: threatpost – The First Stop for Security News – How I Got Here: Chris Wysopal

March 31, 2013

Comments Off on From: threatpost – The First Stop for Security News – How I Got Here: Chris Wysopal

a quick re-post from threatpost – The First Stop for Security News http://threatpost.com/en_us/blogs/how-i-got-here-chris-wysopal-032813 How I Got Here: Chris Wysopal by Dennis Fisher Dennis Fisher talks with Chris Wysopal of Veracode about his journey from a teenage BBS user to member of the L0pht to respected security researcher. Known as Weld Pond since his days at […]

From: Securosis Highlights – Estimating Breach Impact

March 31, 2013

Comments Off on From: Securosis Highlights – Estimating Breach Impact

a quick re-post from Securosis Highlights https://securosis.com/blog/estimating-breach-impact Estimating Breach Impact by (author unknown) Russell Thomas and a bunch of his friends recently posted a research paper called How Bad Is It? – A Branching Activity Model to Estimate the Impact of Information Security Breaches, which attempts to provide a structure for estimating the impact of […]

From: Securosis Highlights – Defending Cloud Data: IaaS Encryption

March 31, 2013

Comments Off on From: Securosis Highlights – Defending Cloud Data: IaaS Encryption

a quick re-post from Securosis Highlights https://securosis.com/blog/defending-cloud-data-iaas-encryption Defending Cloud Data: IaaS Encryption by (author unknown) Infrastructure as a Service (IaaS) is often thought of as merely as a more efficient (outsourced) version of our traditional infrastructure. On the surface you still manage things that look like simple virtualized networks, computers, and storage. You ‘boot’ computers […]