2001 - 2003: - Windows vulnerabilities Windows enable worms 2012 - 2014: - Open Source vulnerabilities enable cybertheft Continue reading Twelve Word Tuesday: Internet Attack Cycles And Solar Cycles Have 11 Years in Common
The Home Depot breach is the latest "largest ever," but it is really just another example of "you can pay me now, or you can pay me a lot more later" proving out once again as the details come out. The root cause of the breach can be traced to Home Depot's failure to implement … Continue reading Simple Math: It Always Costs Less to Avoid a Breach Than to Suffer One
More browser security popups are as useful as more drug side-effect warnings. Google plans Chrome pop-ups for sites using SHA-1 Continue reading Twelve Word Tuesday: Browsers Should Be Like Car Windshields, Not Car Rental Agreements
There's nothing like nude pictures of celebrities to raise the visibility of a security breach - the iCloud exposure is the latest to zoom up the Google Trend charts. The underlying problem appears to be that while Apple does offer two-factor authentication for logging into iClouds and for making iTunes purchases, that strong authentication did … Continue reading Why Does Apple.com/security Try to Sell Me OS/X vs. Tell Me How to Stay Secure Using Apple Stuff?
Security SDLC guidelines seem to talk Esperanto, developers only hear individual languages. IEEE "Avoiding the Top Ten Software Security Design Flaws" published Continue reading Twelve Word Tuesday: How Do We Get Security KoolAid into Developers Waterholes?