Blog

4th Amendment vs Virtual Force by Feds, Trojan Horse Warrants for Remote Searches?

4th Amendment vs Virtual Force by Feds, Trojan Horse Warrants for Remote Searches? Can the government legally deploy malware for eavesdropping and remote searches, in order to investigate and control […]

Facebook Wants to Issue Your IRL Offline ID & Internet Driver's License

Facebook Wants to Issue Your IRL Offline ID & Internet Driver’s License At the start of this year, it seemed as if Facebook wanted to utilize its identity infrastructure already […]

Privacy Nightmare: Data Mine & Analyze all College Students' Online Activities

Privacy Nightmare: Data Mine & Analyze all College Students’ Online Activities 1984 surveillance tactics continue in schools by suggestions of sharing collected student data with fusion centers. There is another […]

Secret Snoop Conference for Gov't Spying: Go Stealth, Hit a Hundred Thousand Targets

Secret Snoop Conference for Gov’t Spying: Go Stealth, Hit a Hundred Thousand Targets Forget passive monitoring; go stealth to hit your target says the Hacking Team which sells hacking techniques […]

Brandjacked Google+ page slings insults at Bank of America

Brandjacked Google+ page slings insults at Bank of America   America’s biggest banking institution had its brand dragged through Web2.0rhea, after an imposter pretended to be the Bank of America […]

Spamford Wallace charged for hacking 500,000 Facebookers

Spamford Wallace charged for hacking 500,000 Facebookers By Dan Goodin in Las Vegas • Get more from this author Posted in Crime, 5th August 2011 00:32 GMT   One of […]

ISC(2) SecureSanAntonio – Jan 19, 2012

Jan 19, 2012 San Antonio Marriott Northwest 3233 NW Loop 410 San Antonio, Texas 78213   Privacy and Security Challenges With Cloud Computing 6 CPEs for CISSPs and ISC2 members […]

ISC(2) SecureDallas – Jan 20 2012

  Jan 20, 2012 Dallas/Ft Worth Marriott Solana 5 Village Circle Westlake, TX 76262   Privacy and Security Challenges With Cloud Computing 6 CPEs for CISSPs and ISC2 members   […]

ISC(2) SecureDenver 2011

Nov 7, 2011 – 08:00 Denver Marriott South at Park Meadows 10345 Park Meadows Dr Littleton, CO 80124   Privacy and Security Challenges With Cloud Computing 6 CPEs for CISSP […]

Mac monoculture is perfect breeding ground for GPU-hungry malware

A monoculture exists when one breed of a crop or product dominates the landscape – and a single new threat wipes out the crop.   Windows has long been the […]