A posting from naked security titled ” Cracked Uber accounts tumble to 40 cents on the dark web” by Lisa Vaas emember those cracked Uber accounts that were selling for as little as $1 on the dark web a few months ago? Well, welcome to the Midsummer Madness Sale: prices have been slashed, and now, they’re going […]
This author has not written his bio yet.
But we are proud to say that fdesir contributed 232 entries already.
Entries by fdesir
A posting from naked security titled ” Using ambient sound as a two-factor authentication system” by Lee Munson We know that many of us are no good at choosing our own passwords. That’s why companies are increasingly looking to bolster their own website security through additional authentication methods. To that end, we’ve seen many different forms of […]
A posting from Dark reading titled ” Why AT&T’s ‘Willingness’ To Help NSA Is Alarming” by Eric Zeman The NSA would have had a much more difficult time spying on Americans were it not for the comfortable, chummy partnership the government forged with AT&T, say new documents released by Edward Snowden. AT&T worked closely with the government […]
A video posting form Dark reading titled “Richard Bejtlich Talks Business Security Strategy, US Security Policy” by Richard Bejtlich Chief security strategist of FireEye talks at the Dark Reading News Desk at Black Hat about what should really be driving your security department’s strategy. Plus he discusses law enforcement agencies’ efforts to put backdoors in […]
A posting from NakedSecurity titled “NSA sets date for purge of surveillance phone records ” by Lisa Vaas The National Security Agency (NSA) has set a date to purge phone records collected during its bulk surveillance program. “Analytic access” to the five years worth of records will end on 29 November, and they’ll be destroyed […]
An interesting article from DarkReading titled “Code Theft: Protecting IP At The Source” by Anna Chiang. Your corporate assets are at risk and every day that you avoid taking action shortens the time until your IP will be leaked. Here are six steps toward better data security. The security world is awash with various malware-centric cyber […]
An interning article titled “Online Security: How The Experts Keep Safe” from information week by Thomas Claburn. In the 1976 thriller Marathon Man, Nazi war criminal Dr. Christian Szell tortures runner “Babe” Levy to find out whether it’s safe for him to retrieve diamonds stored in a bank deposit box. “Is it safe?” Szell asks repeatedly. Levy, […]
An interesting article from Darkreading by Eric Zeman titled ” iPhone Kill Switch: How Effective Is It?” My iPhone 6 Plus was picked from my pocket in Barcelona in March as I walked home from dinner one evening. After speaking to local police for a few moments, I ran back to my hotel to locate […]
A posting from dark reading by Kelly Jackson Higgins titled “Researchers Enlist Machine Learning In Malware Detection ” No sandbox required for schooling software to speedily spot malware, researchers will demonstrate at Black Hat USA. In 100 milliseconds or less, researchers are now able to determine whether a piece of code is malware or not — and […]
An interesting article from informationweek by Kelly Sheridan titled ” Windows 10 Will Use Virtualization For Extra Security” When we’re talking about Windows 10features, security upgrades are often edged out of the spotlight by flashy additions like Cortana for desktop, Microsoft Edge, and Universal Apps. Perhaps this is because Microsoft is targeting a broad consumer audience with […]