Entries by fdesir

Using ambient sound as a two-factor authentication system

A posting from naked security titled  ” Using ambient sound as a two-factor authentication system” by Lee Munson We know that many of us are no good at choosing our own passwords. That’s why companies are increasingly looking to bolster their own website security through additional authentication methods. To that end, we’ve seen many different forms of […]

Why AT&T’s ‘Willingness’ To Help NSA Is Alarming

A posting from Dark reading  titled ” Why AT&T’s ‘Willingness’ To Help NSA Is Alarming” by Eric Zeman The NSA would have had a much more difficult time spying on Americans were it not for the comfortable, chummy partnership the government forged with AT&T, say new documents released by Edward Snowden. AT&T worked closely with the government […]

Richard Bejtlich Talks Business Security Strategy, US Security Policy

A video posting form Dark reading titled “Richard Bejtlich Talks Business Security Strategy, US Security Policy”  by Richard Bejtlich Chief security strategist of FireEye talks at the Dark Reading News Desk at Black Hat about what should really be driving your security department’s strategy. Plus he discusses law enforcement agencies’ efforts to put backdoors in […]

NSA sets date for purge of surveillance phone records

A posting from NakedSecurity titled “NSA sets date for purge of surveillance phone records ” by  Lisa Vaas  The National Security Agency (NSA) has set a date to purge phone records collected during its bulk surveillance program. “Analytic access” to the five years worth of records will end on 29 November, and they’ll be destroyed […]

Code Theft: Protecting IP At The Source

An interesting article from DarkReading titled “Code Theft: Protecting IP At The Source” by Anna Chiang.   Your corporate assets are at risk and every day that you avoid taking action shortens the time until your IP will be leaked. Here are six steps toward better data security. The security world is awash with various malware-centric cyber […]

Online Security: How The Experts Keep Safe

An interning article titled “Online Security: How The Experts Keep Safe” from information week by Thomas Claburn. In the 1976 thriller Marathon Man, Nazi war criminal Dr. Christian Szell tortures runner “Babe” Levy to find out whether it’s safe for him to retrieve diamonds stored in a bank deposit box. “Is it safe?” Szell asks repeatedly. Levy, […]

iPhone Kill Switch: How Effective Is It?

An interesting article from Darkreading by Eric Zeman  titled ” iPhone Kill Switch: How Effective Is It?” My iPhone 6 Plus was picked from my pocket in Barcelona in March as I walked home from dinner one evening. After speaking to local police for a few moments, I ran back to my hotel to locate […]

Researchers Enlist Machine Learning In Malware Detection

A posting from dark reading by Kelly Jackson Higgins titled “Researchers Enlist Machine Learning In Malware Detection ” No sandbox required for schooling software to speedily spot malware, researchers will demonstrate at Black Hat USA. In 100 milliseconds or less, researchers are now able to determine whether a piece of code is malware or not — and […]

Windows 10 Will Use Virtualization For Extra Security

An interesting article from informationweek by Kelly Sheridan titled ”  Windows 10 Will Use Virtualization For Extra Security”   When we’re talking about Windows 10features, security upgrades are often edged out of the spotlight by flashy additions like Cortana for desktop, Microsoft Edge, and Universal Apps. Perhaps this is because Microsoft is targeting a broad consumer audience with […]