Analyzing Data Breaches: Can we Tolerate Status Quo?
An interesting paper on the analysis of the frequency of data breaches. It is an attempt by Benjamin Edwards, Steven Hofmeyr, and Stephanie Forrest. These researchers obtained the data from…
Defend Your Systems
An interesting paper on the analysis of the frequency of data breaches. It is an attempt by Benjamin Edwards, Steven Hofmeyr, and Stephanie Forrest. These researchers obtained the data from…
As I was scanning the Internet for interesting relevant articles this is the one I thought was unique in discussing a fundamental issue of our time(in 2015) http://www.infoworld.com/article/2616931/firewall-software/why-you-don-t-need-a-firewall.html Plus Roger…
Threatpost has the story: https://threatpost.com/court-rules-ftc-has-authority-to-punish-wyndham-over-breaches/114390 From the court brief http://www2.ca3.uscourts.gov/opinarch/143514p.pdf are some interesting snippets: Let’s list the cybersecurity problems that Wyndham had: Stored CC data (which is a violation of…
We have to continue “learning” from high profile hacks. As you may have read in the news a “dating” site that attracts extra marital hookups has been hacked by some…
The talk on pdf form at Defcon media servers: Inter-VM data exfiltration – The art of cache timing covert channel on x86 multi-core By Etienne Martineau a kernel developer. So…