Car hacking code released at Defcon

Saturday, August 3rd, 2013

You may hate parallel parking, but you're going to hate it even more when somebody commandeers control of your car with you in it. That was the scary scenario painted over the first two hours at the 21st annual Defcon hacker conference. "Car hacking is definitely coming," said Zoz, of Cannytophic Design, who presented ...

Bank security breaches destroy customer trust

Friday, July 19th, 2013

85 percent of U.S. adults with banking accounts are at least somewhat concerned about online banking fraud, according to Entersekt. Such fraud can include phishing, malware, man-in-the-browser and brute force attacks. While concern is worth noting, it is action that impacts the ultimate health of a financial institution. Seventy-one percent of ...

65 Open Source Replacements for Security Software

Wednesday, March 14th, 2012

This is a great list of 65 open source projects to replace various security applications that you are probably running right now.  I personally use most of them and it's great to see such a thorough list like this posted all in one place.  Source: http://www.datamation.com/security/65-open-source-replacements-for-security-software-1.html

Google+ Gets a “+1″ for Browser Security

Sunday, August 21st, 2011

Launching a new Web app today comes with a few certainties, and one of them is, “I will be a target for hackers” for sure.  So when an app as large and as high profile as Google+ launches, it will surely be one of the top targets for malicious activity.  ...

NSA’s Guide to Securing Your PC

Monday, May 23rd, 2011

NSA has developed and distributed configuration guidance for operating systems. These guides are currently being used throughout the government and by numerous entities as a security baseline for their systems. Source: http://www.nsa.gov/ia/guidance/security_configuration_guides/operating_systems.shtml