Browsing All Posts filed under »reading«

From: Slashdot – FBI’s Smartphone Surveillance Tool Explained In Court Battle

April 9, 2013

Comments Off on From: Slashdot – FBI’s Smartphone Surveillance Tool Explained In Court Battle

a quick re-post from Slashdot http://yro.slashdot.org/story/13/04/09/1659214/fbis-smartphone-surveillance-tool-explained-in-court-battle?utm_source=rss1.0mainlinkanon&utm_medium=feed FBI’s Smartphone Surveillance Tool Explained In Court Battle by Soulskill concealment writes with news that a court battle has brought to light details on how the FBI’s “stingray” surveillance tool works, and how they used it with Verizon’s help to collect evidence about an alleged identity thief. Quoting: “Air […]

From: The Register – Got a BlackBerry? It may be telling your friends when you watch pr0n

April 3, 2013

Comments Off on From: The Register – Got a BlackBerry? It may be telling your friends when you watch pr0n

a quick re-post from The Register http://www.theregister.co.uk/2013/04/03/bbm_sharing_too_much/ Got a BlackBerry? It may be telling your friends when you watch pr0n by (author unknown) Show what I’m listening to: ‘I have come to clean your pool’ Using a Blackberry Z10 for a little one-handed surfing might be more public than desired, as the social-sharing baked into […]

From: Securosis Highlights – Get Ready for Phone Security and Regulations

April 3, 2013

Comments Off on From: Securosis Highlights – Get Ready for Phone Security and Regulations

a quick re-post from Securosis Highlights https://securosis.com/blog/get-ready-for-phone-security-and-regulations Get Ready for Phone Security and Regulations by (author unknown) Emergency services providers and others are being hit with telephone-based denial of service attacks. Nasty stuff, powered by IP-based phone systems. This relates to SWATing (what hit Brian Krebs). It has become trivial to use computers to make […]

From: threatpost – The First Stop for Security News – Firefox 20 Fixes 11 Critical Flaws, Adds Per-Tab Private Browsing

April 2, 2013

Comments Off on From: threatpost – The First Stop for Security News – Firefox 20 Fixes 11 Critical Flaws, Adds Per-Tab Private Browsing

a quick re-post from threatpost – The First Stop for Security News http://threatpost.com/en_us/blogs/firefox-20-fixes-11-critical-flaws-adds-tab-private-browsing-040213 Firefox 20 Fixes 11 Critical Flaws, Adds Per-Tab Private Browsing by Dennis Fisher Mozilla has added a new privacy feature to Firefox that enables users to begin a new private browsing session in a separate tab while still running a normal session […]

From: Subpoena BYOD Mobile Law – How to Confiscate Mobile Device

April 2, 2013

Comments Off on From: Subpoena BYOD Mobile Law – How to Confiscate Mobile Device

a quick re-post from Subpoena BYOD Mobile Law http://hack-igations.blogspot.com/2013/04/seize.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+SpiesSnoopsSnitchesPrivacyLaw+%28Spies%2C+Snoops%2C+Snitches+%26amp%3B+Privacy+Law%29 How to Confiscate Mobile Device by Benjamin Wright Suppose enterprise has a BYOD policy empowering the enterprise to seize employee’s smartphone.  Suppose further that enterprise has reason to believe the phone contains important evidence . . . such as stolen trade secret or records of contract […]

From: Digital Bond’s SCADA Security Portal – Part 3 – NERC CIP V5 – Scope and Flaws

April 2, 2013

Comments Off on From: Digital Bond’s SCADA Security Portal – Part 3 – NERC CIP V5 – Scope and Flaws

a quick re-post from Digital Bond's SCADA Security Portal http://www.digitalbond.com/blog/2013/04/02/part-3-nerc-cip-v5-scope-and-flaws/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+digitalbond%2FoLPM+%28Digital+Bond%29 Part 3 – NERC CIP V5 – Scope and Flaws by chrisjager Chris Jager is a freelance security consultant who is always looking for interesting projects related to NERC CIP or ICS cybersecurity. In this four-part guest post series, he goes over changes to the […]

From: Subpoena BYOD Mobile Law – Attorney-Client Confidentiality | Data Security Breach

April 2, 2013

Comments Off on From: Subpoena BYOD Mobile Law – Attorney-Client Confidentiality | Data Security Breach

a quick re-post from Subpoena BYOD Mobile Law http://hack-igations.blogspot.com/2013/04/secrecy.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+SpiesSnoopsSnitchesPrivacyLaw+%28Spies%2C+Snoops%2C+Snitches+%26amp%3B+Privacy+Law%29 Attorney-Client Confidentiality | Data Security Breach by Benjamin Wright As an enterprise comes to suspect that it may have suffered an infosec incident, it may be wise immediately to involve an attorney. Attorney Work Product Doctrine The “attorney work product” doctrine provides that the content and results of […]

From: Securosis Highlights – An article so bad, I have to trash it

April 2, 2013

Comments Off on From: Securosis Highlights – An article so bad, I have to trash it

a quick re-post from Securosis Highlights https://securosis.com/blog/an-article-so-bad-i-have-to-thrash-it An article so bad, I have to trash it by (author unknown) I almost didn’t write this post since it’s about iOS, and I about defending iOS security too much. Not that I think I’m biased, but I worry about being misinterpreted as an apologetic defender (I’m not […]

From: Digital Bond’s SCADA Security Portal – Value, Risk, and Patch Testing Services

April 2, 2013

Comments Off on From: Digital Bond’s SCADA Security Portal – Value, Risk, and Patch Testing Services

a quick re-post from Digital Bond's SCADA Security Portal http://www.digitalbond.com/blog/2013/04/01/value-risk-and-patch-testing-services/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+digitalbond%2FoLPM+%28Digital+Bond%29 Value, Risk, and Patch Testing Services by Michael Toecker For a bit of history that we all know, ICS wasn’t originally built to be patched and updated on a regular basis. In an automation world that demanded static systems that could perform their function day […]

From: Digital Bond’s SCADA Security Portal – Friday News & Notes

March 31, 2013

Comments Off on From: Digital Bond’s SCADA Security Portal – Friday News & Notes

a quick re-post from Digital Bond's SCADA Security Portal http://www.digitalbond.com/blog/2013/03/29/friday-news-notes-69/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+digitalbond%2FoLPM+%28Digital+Bond%29 Friday News & Notes by Dale Peterson A NATO research team of experts has determined that Stuxnet was an act of war. “Acts that kill or injure persons or destroy or damage objects are unambiguously uses of force.” The use of force is only allowed in […]