- Don't be naive: computers will never be secure | Phil Hendren - Times Online
a great article about the impossibility of total security, the inevitability of security weaknesses, and the responsibility of individual users to take care of their own security... - The Art Of Noh: The dark side of teaching
another look at teaching malware writing in schools, this time from someone once faced with such a curriculum... - Sampling a Malicious Site « Didier Stevens
a nice little video showing the extraction of malware from a malicious site... - TaoSecurity: Microsecurity vs Macrosecurity
an interesting delineation between two security approaches... - Spire Security Viewpoint: Response to Schneier on Full Disclosure
some interesting thoughts on vulnerability disclosure (and indeed, vulnerability research itself) that don't often get heard above the din produced by the full-disclosure-or-bust crowd... - Removing Malware With a Live CD « Didier Stevens
i highlighted the f-secure livecd when they wrote about it on their blog so it's only natural that i'd also highlight a video demonstrating it's use as well... - An Unexpected Demonstration of Mobile Security - F-Secure Weblog : News from the Lab
an intersection between the concepts of mobile malware and old malware, showing that even in the mobile market old platforms (and thus old malware) can still be found and still cause (some) problems... - AMTSO Blog » Blog Archive » Principles and Guidelines available for download
a good read if you're at all interested in how anti-malware products *should* be tested... i like that the very first principle is to not endanger the public - it's very reminiscent of "above all else, do no harm"... it's a principle that's fairly well established in the mainstream anti-malware community but seems to be noticeably absent elsewhere... - ThreatBlog » Blog Archive » It Doesn’t Hurt to Ask
this isn't the first time randy has underlined an easily exploited weakness in a social engineering scheme, and hopefully it won't be the last... "ask now, click later" indeed...
devising a framework for thinking about malware and related issues such as viruses, spyware, worms, rootkits, drm, trojans, botnets, keyloggers, droppers, downloaders, rats, adware, spam, stealth, fud, snake oil, and hype...
Sunday, August 31, 2008
suggested reading
Tags:
suggested reading
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment