Doug Ross @ Journal
Wednesday, June 22, 2005

›
Phishing Variants: Popups and Visual Spoofing Picture credit: http://www.cbc.ca I f you're at all concerned about the rampant epidemic...

›
The Wikitorial Experiment Picture credit: http://aphgcaen.free.fr T he LA Times has called a halt to its commendable Wikitorial experiment...
Tuesday, June 21, 2005

›
Largest Security Breach Ever Revealed: 295 million identities stolen! Picture credit: http://www.howstuffworks.com T he largest case of id...

›
The New James Bond Picture credit: http://www.dancewithshadows.com T he clasically trained British actor Daniel Craig is reported to have ...

›
Which Science Fiction Writer Are You? I am: Gregory Benford A master literary stylist who is also a working scientist. Which science fict...
Monday, June 20, 2005

›
How SQL Injection Works I t's true that we don't quite know the attack vector that was used to install trojan(s) on the CardSystem...

›
More CardSystems Tidbits Emerge Picture credit: http://www.massmenus.com I nteresting information on the CardSystems' security breach....

›
Security? What Security? Picture credit: http://www.regiononline.com I T-Director's Robin Bloor has some choice commentary on the new...

›
From the miscellaneous items department... Picture credit: NBA T he Spurs' Tim Duncan is one of the smartest and classiest players in ...

›
YubNub: A (social) command-line for the web H ere's a really interesting idea, courtesy of John Battelle's Searchblog . YubNub is ...
Saturday, June 18, 2005

›
CardSystems' missing 40 million records Two consumers enjoying their privacy (CardSystems) T he details are sketchy, yet ominous. As ...
Friday, June 17, 2005

›
PayPal's Comical Anti-Phishing Page Picture credit: http://microsoft.com I have a PayPal account, which I use only sporadically. And...
Thursday, June 16, 2005

›
Fraudsters use iPods to steal company information Picture credit: http://www.conversionfury.com T here are more options for ripping off se...
Wednesday, June 15, 2005

›
The Next Generation of Phishing Tools (Picture credit http://www.carrera-uk.com ) T he folks at SC Magazine -- or, maybe just Maksym Schip...

›
Top Open-Source Security Applications Picture credit: http://www.f-secure.de I f open-source security applications suit your taste (and, f...

›
Frequency Jamming Picture credit: http://www.faa.gov L ike handheld lasers pointed at airliners to (presumably) blind pilots, this Washing...

›
Now that's a concert Picture credit: http://www.espn.com F rom the miscellaneous items department: Suspended Florida State quarterba...
Tuesday, June 14, 2005

›
Protecting Data At Rest Picture credit: http://www.unixwiz.net O ver at RedmondMag, Roberta Bragg notes some good starting points for pr...
Monday, June 13, 2005

›
A Phishing Primer Picture credit: Stern I received this email today, related to some earlier blog postings on the epidemic of phishing...

›
New Scientist on the BlueTooth Vulnerability (Picture credit http://www.tomsnetworking.com ) I wrote a bit last week on the implication...
‹
›
Home
View web version
Powered by Blogger.