• News
  • Blogs
  • Tools & Templates
  • Security Jobs
  • Basics
  • Data Protection
    • Application Security
    • Network Security
    • Cloud Security
    • Social Networking Security
    • Wireless/Mobile Security
    • Malware/Cybercrime
    • Data Privacy
    • PCI and Compliance
    • IT Audit
    • Social Engineering
  • Identity & Access
    • Access Control
    • Identity Management
    • Federated Identity
    • Identity Theft Prevention
  • Business Continuity
    • Emergency Preparedness
    • Disaster Recovery
    • Supply Chain Security
    • Pandemic Preparedness
  • Physical Security
    • Video Surveillance
    • Employee Protection
    • Fraud Prevention
    • Loss Prevention
    • Investigations/Forensics
    • Critical Infrastructure
  • Security Leadership
    • Compliance
    • Executive Communication
    • Security Awareness
    • Strategic Planning/ERM
    • Metrics/Budgets
    • Security Industry
    • Global Security
    • Security Career/Staffing

Salted Hash — IT security news

By Bill Brenner
About this Blog:

IT security news analysis, over easy!

Read Bill's Bio
Subscribe Follow on Twitter
spacer

#BlackHat #DefCon preview: Jericho reflects on 13 years of Errata

spacer
July 20, 2012 |   One of the more popular websites in the security community is attrition.org -- particularly the Errata section, in which so-called charlatans of the industry are exposed. At Black Hat, we’ll hear from Brian Martin -- a.k.a. Jericho – on the history of Errata and how the project has...

FBI could raise threat level after massacre during "Dark Night Rises" showing

spacer
July 20, 2012 |   The FBI is apparently thinking of raising the national threat level following last night's massacre at a showing of "The Dark Night Rises" in

#FFSec: Security pros to follow on Twitter, July 20

spacer
July 20, 2012 |   Follow these names on Twitter. Together, they make cyberspace a more secure place. (copy and paste)

#BSidesLV preview: Jack Daniel on the future of B-Sides

spacer
July 19, 2012 |   At 10 a.m. Wednesday, Las Vegas time, #BSidesLV will begin with a talk from Jack Daniel -- one of the chief organizers -- about where the movement is at and where it's going. I chatted with Jack this morning and got a preview.

#BlackHat #BSidesLV #Defcon preview: Trustwave, all over the place

spacer
July 19, 2012 |   I try not to give too much attention to any one vendor when writing conference previews, but sometimes it's justified. In this case, I see some interesting talks on the agenda by people from Trustwave, so I'm listing some of them below and inviting others -- vendors and non-vendors alike...

#BlackHat preview: Mobile threats take center stage

spacer
July 18, 2012 |   With everyone and their grandparents in possession of smartphones these days, mobile threats are of great interest to Black Hat USA attendees. Vincenzo Iozzo, director of vulnerability intelligence at Trail of Bits and a member of Black Hat's content review board, spoke with me this afternoon...

#BlackHat preview: Owning bad guys with JavaScript botnets

spacer
July 18, 2012 |   One of the talks scheduled for Black Hat USA next week is by researcher Chema Alonso, who will demonstrate the ease with which he created JavaScript botnets and used them to turn the table on the bad guys. In a phone conversation this afternoon, Alonso offered a preview.

A look at BSidesLV 2012

July 18, 2012 |   With all the interest in Black Hat and DefCon, I wanted to remind everyone that BSidesLV is happening next week as well. It'll be at the Artisan Boutique Hotel July 25 and 26.

Layer 7 DDoS attacks decline, report says

spacer
July 17, 2012 |   The number of application layer (Layer 7) attacks against its global client base declined in Q2 2012, according to Prolexic Technologies' newly released DDoS attack report. From the report:

Hackers For Charity auction for one #Defcon Über Badge

spacer
July 17, 2012 |   For diehard DefCon attendees, they are more precious than gold, diamonds and all that glitter: uber badges, a prize that gives the recipient free access to DefCon for life. On the last day of the conference each year, they are given to the top winners of various hacking contests. Or, if you have...

Browse CSO Blogs

See all CSO Blogs »

Recent Comments

Webcasts
  • Virtualizing Disaster Recovery and Business Continuity
  • Moving Your Email to the Trusted Cloud
  • Five Ways to Improve Your Employees' Security While They Surf the Web
  • Four Burning Questions about Moving to Exchange 2010
  • The Owner's Manual for the Cloud
  • Mobilizing Your Collaboration Strategy
» View All Webcasts
White Papers
  • Strategies for Assessing Cloud Security
  • Strengthening Compliance by Preventing Data Leakage from SAP
  • Streamline, Speed and Secure the Supply Chain with Managed File Transfer
  • Secure Managed File Transfer: Bringing Coherence & Control to Compliance
  • Beyond SFTP: Five Ways Secure Managed File Transfer Can Improve Your Business
  • The TCO of FTP: Hidden Costs of "Free" File Sharing
» View All White Papers