Good afternoon everybody! I hope your day is going well.
Here are today's Interesting Information Security Bits from around the web.
- Beware of hasty decisions, early indicators and selection bias.
(Mis)reading the runes << wirewatcher
Tags: ( incident-response ) - The call for papers for Defcon 18 is open. Get to work.
DEF CON(r) 18 Hacking Conference - Call for Papers Announcement
Tags: ( cfg defcon-18 ) - As if managing VoIP wasn't difficult enough already, let's through in steganography.
A new VoIP threat - steganography - RiskPundit
Tags: ( voip steganography ) - This might be a good post to keep handy in the event you need to backout a patch and can't boot.
Using Linux to back out a Windows XP patch - Computerworld Blogs
Tags: ( patching recovery ) - Challenge number 2 is ready for your attention. Give it a go.
Forensic Challenge 2010/2 - "browsers under attack" is now online | The Honeynet Project
Tags: ( forensics challenge ) - A lovely article about flash cookies and what they can tell a forensic investigator.
Local Shared Objects, aka Flash Cookies
Tags: ( flash cookies privacy ) - An interesting topic, tokenization, is covered quite well in this post on InfoCynic.
A New Approach to Enterprise Data Security | Infosec Cynic
Tags: ( encryption tokenization ) - A few things you should be aware of regarding the HITECH act.
7 Things You Need to Know About HITECH | Optimal Security: The Lumension Blog
Tags: ( hitech ) - Alex opines on the cloud, metrics and faith. A good read.
On Cloud Security Metrics >> Dub Cloud
Tags: ( cloud metrics ) - I have attended a couple virtual conferences and enjoyed them. A good line-up here.
Infosecurity (UK) - 2010 Virtual Conference on Endpoint Security - Beyond the Perimeter - Full conference programme revealed
Tags: ( conference virtual )
That's it for today. Have fun!
Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.
Kevin
{ 0 comments }