Last updated:
Fri Oct 24 13:24:40 2014 GMT
  2014 FIRST Annual Conference in Boston - Register now


Blogroll
Glenn Brunette's Security Weblog
Information Security News Desk
Federated Infrastructure : Security
Draft Security Blog
Logblog
Internet Security News and Analysis
TrendLabs | Malware Blog - by Trend Micro
404 - Not Found
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
The Security Skeptic
Burton Group Page Not Found
The Dark Visitor
Speaking of Security, the RSA Blog and Podcast
Fred Avolio's Musings
George Ou
Realtime Community | IT Compliance
Michael Howard's Web Log
The WiFi Zone
Windows Security Logging and Other Esoterica
Internet Insecurity
Sunbelt Blog
Errata Security
Deb Shinder's MVP Blog
Infosec Writers Latest Security Papers
Fixing Email Weblog
honeyblog
b l o g _ m a x i m u m
Phil Windley's Technometria
MoMusings@Arachnid.homeip.net
Schneier on Security
Latest Blog Entires From WebSense Security Labs
Kasun's Weblog
Emergent Chaos
When {Puffy} Meets ^RedDevil^
Compendium
nzight
Dan Anderson's Weblog
Sorry! We couldn't find your document
Static in the Ether
Latests Alerts From Websense Security Labs
Service Provider Journal
taint.org: Justin Mason's Weblog
Windows Incident Response
CyberCrime & Doing Time
Latest Blog Entires From WebSense Security Labs
The Microsoft Security Response Center Blog
Anti Rootkit Blog
Rick Kingslan - Will Hack 4 Food
Financial Cryptography
Page Not Found - ASP.NET Weblogs
Politically Motivated Computer Crime and Hacktivism
Lasipalatsi
Vastly Important Notes
Volatility
CGISecurity.com: Your Web Site and Application Security Resource
Alert Logic
Mal-Aware.org
Esphion
Essential Computer Security
torsten's .NET blog - Security
Latest Analysis for All Threats
Network Security Blog
1 Raindrop
websecurityblog
StillSecure, After All These Years
-- Sleeve notes of a sysadmin --
CERIAS Blog
www.rootkit.com
The Evil Empire
BenEdelman.org
About Internet / Network Security
netstat -a
GPL
Page Not Found - ASP.NET Weblogs
Abner Stories
Crypto-World - news
cybercrime/-security sightings
Vitalsecurity.org - A Revolution is the Solution
Attack Research
Wired: Threat Level
You Know What's Stupid? Everything I Don't Understand
Casper Dik's Weblog
Fabulous Adventures In Coding : Security
PandaLabs
Jim's Bloggyness
Andrew Carpenter
Pinpoint Labs Blog
Kim Cameron's Identity Weblog
Dancho Danchev's Blog - Mind Streams of Information Security Knowledge
Sergey Simakov blog
MSDN: Security
Usable Security
Liudvikas Bukys
Martin Englund's Weblog
Andreas Sterbenz's Blog
Cheap Hack
Krebs on Security
Windows Shell/User (MSN & OneCare Too)
Educated Guesswork
Security to the Core | Arbor Networks Security Blog
Information Security News Desk
Norwegian Honeynet Project
Security
Dana Epp's ramblings at the Sanctuary
Panda Research Blog
The Security Mentor
MVP Jubo Security Blog
@CyberForge
.NET Security Blog
SYN|ACK
An Information Security Place
The Security Mentor
Security Soapbox
C.I.S.R.T.
TaoSecurity
ThreatFire Research Blog
BufferOverrun : Security
SecuriTeam Blogs
Digital ID World Editors Corner
The X Dot Com Inc. - 404 Wrong Page
Wifi Security Project
trimMail's Email Battles
malwarecrawler.com
MZL & Novatech Traffic & Bandwidth Statistics News
Cybercrime
National Cyber Security - Blogs
A Bro Blog
e-Government@large
The ICSI Networking Group Blog
Security Notes
Bowulf Infosec & Network Admin Blog
Casper Dik's Weblog
bIPlog
Internet Security with Kirk
IBM Internet Security Systems Frequency X Blog
Greyhat of the World Unite...
: 404 Not Found
LuFG Summerschool Applied IT Security
Vulnerability Analysis Blog
The Antivirus Guy Blog
Spam Filtering Techniques
Kimberly L. Tripp: Improving *my* SQL skills through your questions! - Security
RedTeam
Bill Sommerfeld's Weblog
Error!
McAfee Avert Labs
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
In-Security : Exploring Internet, Information and Infrastructure Security
invulnerableit.com Blog
Hex blog
OpenPacket Blog
Anton Chuvakin, O'Reilly Network
fes' WebLog
Page Not Found - ASP.NET Weblogs
Small Business Server
Solution Accelerators - Security & Compliance
A Day in the Life of an Information Security Investigator
eEye Digital Security - Research Blog
Network Security Blog
Vodun.org
Roger Thompson
The Day Before Zero
Spire Security Viewpoint
-- Sleeve notes of a sysadmin --
Sorry! We couldn't find your document
antlab
whattheflex
Cynical Security
Information Research
Harry Waldron - Microsoft MVP Blog
Security Blanket
Errata Security
infosec « WordPress.com Tag Feed
Matasano Chargen
Lauren Weinstein's Blog
NI3
Page Not Found - ASP.NET Weblogs
Security Curve Weblog
NetSec
Anil John - Security
F-Secure Antivirus Research Weblog
turnipsecurity
Security Blog
GnuPG.org
Security Fix
Steve Lamb's Blog : How to Articles
Larry Seltzer's Security Weblog
Nth world commentaries
Technology Review Feed - TR Editors' Blog
Carnal0wnage Blog
OSSEC Blog
TheSecure.Net
Larry Osterman's WebLog : Security
Security Watch
Caffeinated Security
Glenn Brunette's Security Weblog
Tim Rains' WebLog
New Directions in Security (Comments)
CyberSpeak's Podcast
Will Cox: Security
blackhat for life
Verizonbusiness.com
Page Not Found - ASP.NET Weblogs
APB Infosec blog
Security Fix
Information Manager Journal
Tenable Network Security
Stupid Security
ModSecurity Blog
Fermats Security Alerts
The Security Development Lifecycle
Paul's Down-Home Page: Exchange, messaging, collaboration, security, and more
Security Response Weblog
Inliniac
Daemon on Security
Robert Hensing's Blog
Arun Perinkolam's Weblog
Wendy's Blog: Legal Tags
Aaron Margosis' "Non-Admin" WebLog
Eugene Bobukh's WebLog
Solution Accelerators - Security & Compliance
DoxPara Research
Infosec Potpourri
Roger's Information Security Blog
Infosec Events
Security and Technology for SMB's and SOHO's
KyleM.xwell
Security Garden
::PepperTech:: Security Management News Blog
Larry's Insecurity Blog
Freedom to Tinker
The Importance of...
The Security Blanket
Ivan
John Palfrey
CERIAS Weblogs
Page Not Found - ASP.NET Weblogs
Sorry! We couldn't find your document
SophosLabs blog
1 Raindrop
Volatile Systems
BlogInfoSec.com
Security Manifest
mcwresearch.com
Napsterization
securosis.com
REblog
The Security Skeptic
Michael Howard's Web Log : Security
Mark O'Neill's Radio Weblog
disLEXia 3000 blog
Computing Research Policy Blog
HD DVD / Randomness... : Security
-- Sleeve notes of a sysadmin --
worm blog
Bkis Blog
Adobe Product Security Incident Response Team (PSIRT)
Page Not Found - ASP.NET Weblogs
Thomas Shinder Blog
ADD / XOR / ROL
Sam Gentile
ADD / XOR / ROL
chandanlog(3C)
Infothought
Anti-Malware Engineering Team
OSVDB Blog
Network Security
InfoWorld Gripe Line | Ed Foster
Xavier's Security Post
Kaspersky Lab Weblog
Open-Node.net Security Weblog
Security Sauce
Mark's Blog
weblog.cemper.com - Technology, Software Development, Project Management, Marketing News
DISOG
October 24, 2014


Intel Introduces Data Protection Technology For Transactions - Retail Solutions Online (press release)
infosec « WordPress.com Tag Feed

Retail Solutions Online (press release) Intel Introduces Data Protection Technology For Transactions


Now Everyone Wants to Sell You a Magical Anonymity Router. Choose Wisely
Wired: Threat Level

Maintaining your privacy online, like investing in stocks


How to kill a troll
SophosLabs blog

A new Pew study confirms what we already know: online harassment is a widespread disease afflicting the internet. Ignoring trolls and hoping they'll go away is actually quite effective, survey respondents said. Then again, how about fighting back, inste


Twitter invites us to say goodbye to passwords, use Digits instead
SophosLabs blog

Twitter's new credentials handling scheme is called Digits, and it's hoping that mobile app developers use it to enable their users to sign in with their phone numbers as identifiers, along with one-time passwords SMSed to the phones.


Has the "Sandworm" zero-day exploit burrowed back to the surface?
SophosLabs blog

You may have noticed that Microsoft recently published a Security Advisory that sounds a lot like the "Sandworm" vulnerability all over again. Paul Ducklin explains...


Attackers change home routes' DNS setting via malicious code injected in ads
infosec « WordPress.com Tag Feed

Sucuri Security researchers have unearthed a malvertising campaign aimed at changing the DNS setting


Do we really need strong passwords?
SophosLabs blog

The idea that computer users should use long, complex passwords is one of computer security's sacred cows. But is is really necessary? Mark Stockley investigates...


60% of Android attacks use financial malware
infosec « WordPress.com Tag Feed

Malicious programs targeting Android-based devices in order to steal money were used in 60 percent o


2FA: Google offers physical alternative to verification codes
infosec « WordPress.com Tag Feed

Google is offering an alternative second factor for its two-step account verification option, one th

October 23, 2014


App Launcher Added to Outlook
Security Garden


Privacy Notice and Choice in Practice: Brown Bag Lunch with Pedro Leon
You Know What's Stupid? Everything I Don't Understand


Security Advisory 3010060 released
infosec « WordPress.com Tag Feed

Today, we released Security Advisory 3010060 to provide additional protections regarding limited, ta


Spam Nation Publisher Discloses Card Breach
Krebs on Security

In the interests of full disclosure: Sourcebooks, the company that on Nov. 18 is publishing my upcoming book about organized cybercrime, disclosed last week that a breach of its Web site shopping cart software may have exposed customer credit card and per


Data protection obligations on banks into force in Italy - JD Supra (press release)
infosec « WordPress.com Tag Feed

Data protection obligations on banks into force in ItalyJD Supra (press release)The Italian Data Pro


New Mobile OS Versions Improve Security
TrendLabs | Malware Blog - by Trend Micro

The competition between mobile OSesis heating up, with Apples iOS 8 and Googles Android Lollipop in tight competition, as the public discovers their features and what these OSs can do for them. There are notable changes and significant improvements in the


Several Staples Stores Suffer Data Breach
infosec « WordPress.com Tag Feed

Attack appears smaller in scope but similar to incidents reported by several other major retailers t


WRF 2/e Contest
Windows Incident Response

UK considering imprisoning cowardly, venomous trolls for up to 2 years
infosec « WordPress.com Tag Feed

Justice Secretary Chris Grayling said that new laws would quadruple the current maximum six-month te


Pro-Privacy Senator Wyden on Fighting the NSA From Inside the System
Wired: Threat Level

Pro-Privacy Senator Wyden on Fighting the NSA From Inside the System

Wyden spoke with WIRED about the difficulties of keeping mum on classi


Google goes beyond two-step verification with new USB Security Key
SophosLabs blog

Google's adding support for a physical USB second factor that will first verify the login site as being a true Google website, not a fake site pretending to be Google, before it hands over a cryptographic signature. UK broadcasters warned that filming with drones must comply with data ... - Tech Digest
infosec « WordPress.com Tag Feed

Tech Digest UK broadcasters warned that filming with drones must comply with data …Tech Digest


SSCC 170 - Is the best time to shop at a store right after it has a breach? [PODCAST]
SophosLabs blog

Here's the latest episode of our weekly security podcast. Join Sophos experts Chester Wisniewski, John Shier and Paul Ducklin as they turn news into advice...Data protection may be stumbling block for guidance guarantee - Money Marketing
infosec « WordPress.com Tag Feed

Money Marketing Data protection may be stumbling block for guidance guaranteeMoney MarketingHe adds:


Cloud adoption trends in European organizations
infosec « WordPress.com Tag Feed

In Europe, the number of cloud services in use by the average company increased 23 percent, rising f


Named Top 50 InfoSec Blogs You Should Be Reading
Roger's Information Security Blog

DigitalGuardian has named this blog as one of the Top 50 Infosec Blogs you should be reading. DigitalGuardianbyVerdasys offers an interesting solution in the DLP area as well asadvanced threat protection. Definitely worth checking out.

The post


all content is copyright its respective owner or owners.

the technology behind infosec daily is partially copyright © 2003-2008 jose nazario.