Crime? What crime?
Hackers have become so detached from their crimes that they'll attack little old ladies and the American Red Cross, and feel perfectly fine about it.
Security lessons from Katrina
There are some important lessons that all security people should learn (but probably won't) from hurricane Katrina.
Embedded market ripe for picking
Embedded devices, from routers to refrigerators, have vulnerabilities but often there is no clear way to update and patch these systems. That makes some of them ripe for exploit.
A changing landscape
As the number of reported security breaches skyrockets compared to the number of vendor-published vulnerabilities, we have to look at the compromise of the average end-user as the inevitable result.
Exploiting Cisco with FX
This interview with FX discusses Cisco IOS exploitation, Michael Lynn's work, and what FX believes can be done when hacking IOS.
The great firewall of China
When a barrage of attacks and hacking attempts come from IP addresses traced back to China, and you don't do any business in China, do you block their entire IP address range and call it a day?
Is disassembly, decompiling and reverse engineering commercial software products legal? Can it be bound by copyright law or a software license agreement?
It's only a matter of time...
Apple is going to have to patch sooner once they start to be targeted by attackers.
Jose Nazario discusses worms
Interview with Jose Nazario to discuss worms and the design goals and propagation mechanisms behind them.
Greasing the wheel with Greasemonkey
With any new technology there are always a discussions about new functionality versus new security holes, and open source versus closed source software. Greasemonkey is a great example of what works and what doesn't.