Posts

HP Awards $240K for Firefox, IE, Chrome and Safari Exploits

Fwd: Hacking BIOS Chips Isn't Just the NSA's Domain Anymore | WIRED

Fwd: All four major browsers take a stomping at Pwn2Own hacking competition | Ars Technica

Fwd: [Caja] Understanding the difference between Google Caja and Secure ECMAScript (SES), and if SES is ready to use

PP250 Power Point Presentations

Thunderstrike MacBook malware attacks computers via Thunderbolt port | IT PRO

Fwd: [cap-talk] some capability queries

The FBI Used the Web's Favorite Hacking Tool to Unmask Tor Users | WIRED

Intel+boss'+warning+on+cyber+attacks+no+joke,+say+experts+|+Fox+News

Stealthy, sophisticated 'Regin' malware has been infecting computers since 2008 | PCWorld

Ghosts in the machine language – Elevate

Fwd: [cap-talk] A new type of phishing attack

Fwd: [Caja] Rich-text editors compatible with Caja

Do airplanes evolve like birds? - CSMonitor.com

How a bug in Windows might be costing humanity over 600 years of wasted time per day - garry's posthaven

EXECUTION ENVIRONMENTS | Hypervisor

Cyber attack on oil firms ‘could cost billions’ - Top stories - The Scotsman

About seL4 | seL4

Fwd: [cap-talk] Fwd: seL4 is going open source

What To Do If Your iPhone Is Hacked And Remotely Locked : All Tech Considered : NPR

Iranian Hackers Stalked U.S. Officials, Report Says - Bloomberg

Scientists achieve reliable quantum teleportation for first time

Edward Snowden responds to release of e-mail by U.S. officials - The Washington Post

Estonia exercise shows NATO's growing worry about cyber attacks | Science & Technology | Worldbulletin News

The biggest ever cyber attacks and security breaches - Telegraph

Car-Hacking Goes Viral In London - Forbes

Dozens of Arrests in 'Blackshades' Hacking Around the World - ABC News

Alleged Chinese Hacking: Alcoa Breach Relied on Simple Phishing Scam - WSJ.com

Military acquisition rules hamper U.S. ability to counter cyber threats

Hackers ramp up computer attacks that demand 'ransom'

Chinese military officers charged with hacking U.S. Steel, Allegheny Technologies, Westinghouse - Pittsburgh Business Times

Dozens of Arrests in 'Blackshades' Hacking Around the World - ABC News

Lockheed Martin says cyber attacks swell - Computer Business Review

Hackers ramp up computer attacks that demand 'ransom'

THE UNCERTAINTY OF GENERAL PURPOSE DIGITAL COMPUTERS

Exclusive: Meet the Fed's First Line of Defense Against Cyber Attacks

Fed_Cybersecurity_RD_Strategic_Plan_2011.pdf

Critical Security Update for Internet Explorer

Authority Based Access Control : Open Social Networking and Computer Security in the 21st Century

What makes a security consultant an expert?

Vista security defeated; IOS rootkit; DNS flaw 'worse than thought'

What's inside the Apple iPhone 3G?

The Ten Most Important Security Trends of the Coming Year

Top Ten Cyber Security Menaces for 2008

Renaming the Administrator Account?

ACL Security in Windows Vista

Vista Security Is Annoying by Design

'Pro-Tibet' Rootkit Attacks Windows PCs

Virtualization's Dark Side

State Department IT requirements

Microsoft Speech Server SDK Installation

Object Capabilities

Customize a new Home Page

The Shell (_layoutWorkspace)

Customize Shell

Customize the Splash Screen for Startup

Navigation ( see _deckWorkspace)

Cabana Installation

Introduction