Hacking May 25, 2011 Yiannis Kakavas Creepy, the geolocation information aggregator So what is Creepy actually and how does it come into the “Geolocation” picture ? Creepy is a geolocation information aggregation tool. It allows users...
Hacking May 24, 2011 Infosec TeamShatter Reveals their Process for Security Research In our ongoing series of interviews, we are doing things a little differently this week and interviewing four members of TeamSHATTER. They answered a few questions...
ISACA CISA May 24, 2011 Kenneth Magee IT auditing and controls – Auditing organizations, frameworks and standards What is a standard? Who defines standards? Where do we as IT auditors come into contact with standards? Which framework should we use to do an IT audit...
Digital forensics May 23, 2011 Alec Waters The Case of the Great Router Robbery NEWSFLASH: AnyTown Local News reports this Monday morning that the recent spate of office break-ins has continued with a weekend raid on the downtown branch...
Hacking May 18, 2011 Infosec Exploiting gresecurity/PaX with Dan Rosenberg and Jon Oberheide Following their presentation at Infiltrate 2011, Jon Oberheide and Dan Rosenberg answered a few questions about the talk they gave. Jon Oberheide is the CTO...
General security May 17, 2011 Infosec Kevin Finisterre Reveals His Process for Security Research In our ongoing series of interviews, this week Kevin Finisterre answered a few questions and pulled back the curtain a bit on the methods, tools and motivation...
General security May 16, 2011 Infosec Are YOU Wearing A Hoodie? Fox recently canceled their show about hackers "Breaking In." Whatever you might have thought about the show, it got people talking and thinking about hackers....
Management, compliance & auditing May 16, 2011 Kenneth Magee IT auditing and controls – An introduction Auditing is an evaluation of a person, organization, system, process, enterprise, project or product, performed to ascertain the validity and reliability of...
Management, compliance & auditing May 13, 2011 Kenneth Magee IT auditing and controls – An overview So you want to be an IT Auditor….. Over the course of the next few weeks, I will be posting some ten articles to help you understand what it takes to move...
Operating system security May 12, 2011 Matt Mossman Android Security: Take Control Are you in control of your Android device? Really? Then answer this brief survey: Has every single app on your phone been installed from the Android market? Have...