Stop Attacking Me – Don’t exploit My Code Bro
The Oracle CSO (Chief “Security” Officer) statements show a misunderstanding of IT security principles. IT-Security BlogNotions post is appropriate: That is why I came up with “Don’t Expose My Code…
Courts Uphold FTC Regulation-Punishment to Negligent Company
Threatpost has the story: https://threatpost.com/court-rules-ftc-has-authority-to-punish-wyndham-over-breaches/114390 From the court brief http://www2.ca3.uscourts.gov/opinarch/143514p.pdf are some interesting snippets: Let’s list the cybersecurity problems that Wyndham had: Stored CC data (which is a violation of…
Ashley Madison Hack Proves CyberSecurity Must Be Six Sigma Secure
We have to continue “learning” from high profile hacks. As you may have read in the news a “dating” site that attracts extra marital hookups has been hacked by some…
Cyberjoke Friday v1.4
Check out this computer joke section: http://www.surfersam.com/friends/funny-computer-jokes.htm Surfer Sam has several interesting computer jokes (my opinion of course) Artificial Intelligence usually beats real stupidity. I always love the old computer…
Defcon talk: Hacking Inter-VM Instance data
The talk on pdf form at Defcon media servers: Inter-VM data exfiltration – The art of cache timing covert channel on x86 multi-core By Etienne Martineau a kernel developer. So…
