Why Everyone Should Be Using a Web Proxy
If you haven't heard about it by now, let me clue you in: Java is a security nightmare. A few days ago,…
Read MoreOn Key Management and Tokenization
I often get into debates on the use of encryption and it being the panacea of data protection. While…
Read MoreDefCon 20 Recap
Jason Staggs is a current participant in True's formal internship program and attended DefCon20 as part…
Read MoreU.S. Navy Contracts to Build Tools for Extracting Info from Video Game Systems
Before deciding to participate in your favorite online games, you might be interested to know what the…
Read MoreTroubleshooting Forensic Drive Imaging and 'Advanced Format' (4K Cluster) Drives
In the course of a recent incident response engagement, I ran into a hard-to-track-down problem involving…
Read MoreWhen A Credit Card Payment Processor Gets Hacked
Not to make light of the gravity of the event, but here we go again - Consumers are subjected to another…
Read MoreOn Stuxnet Adaptation
With the recent focus on Stuxnet due to the CBS 60 Minutes Special: Stuxnet: Computer worm opens new…
Read MoreMS12-020 Proof-of-Concept in the Wild
Well, that didn't take long. As of Thursday, an MS12-020 PoC (the Remote Desktop Protocol vulnerability)…
Read MoreIncrease Windows Network Security Through Group Policy Software Installations
Seeing the rate at which companies have been successfully attacked by Java exploits while their users…
Read MoreRemote Desktop Vulnerability (MS12-020) Is the Worst of the Worst
The MS12-020 vulnerability for which Microsoft released a patch yesterday is about as bad as you can…
Read More