
Why Everyone Should Be Using a Web Proxy
If you haven't heard about it by now, let me clue you in: Java is a security nightmare. A few days ago,…
Read More
On Key Management and Tokenization
I often get into debates on the use of encryption and it being the panacea of data protection. While…
Read More
DefCon 20 Recap
Jason Staggs is a current participant in True's formal internship program and attended DefCon20 as part…
Read More
U.S. Navy Contracts to Build Tools for Extracting Info from Video Game Systems
Before deciding to participate in your favorite online games, you might be interested to know what the…
Read More
Troubleshooting Forensic Drive Imaging and 'Advanced Format' (4K Cluster) Drives
In the course of a recent incident response engagement, I ran into a hard-to-track-down problem involving…
Read More
When A Credit Card Payment Processor Gets Hacked
Not to make light of the gravity of the event, but here we go again - Consumers are subjected to another…
Read More
On Stuxnet Adaptation
With the recent focus on Stuxnet due to the CBS 60 Minutes Special: Stuxnet: Computer worm opens new…
Read More
MS12-020 Proof-of-Concept in the Wild
Well, that didn't take long. As of Thursday, an MS12-020 PoC (the Remote Desktop Protocol vulnerability)…
Read More
Increase Windows Network Security Through Group Policy Software Installations
Seeing the rate at which companies have been successfully attacked by Java exploits while their users…
Read More
Remote Desktop Vulnerability (MS12-020) Is the Worst of the Worst
The MS12-020 vulnerability for which Microsoft released a patch yesterday is about as bad as you can…
Read More