Can I use a CISSP book to study for SSCP?
Can I use a CISSP book to study for SSCP? That’s a good question, and a good idea, but I don’t recommend it anymore.
Can I use a CISSP book to study for SSCP? That’s a good question, and a good idea, but I don’t recommend it anymore.
I was listening to the excellent Risky Business analysis of the Droidpocalypse this week, and I’m happy to report that the vulnerability that affects 90% of Android devices ever made, while serious, is vastly overstated. Read More »Reports of the Droidpocalypse have been greatly exaggerated
If one person uses a password, another will. That’s a popular hacking theory. If that’s true, then chances are if one person asks a question, another will. So here are three short questions (one completely unrelated to the others) I found in my logs over the weekend, and their answers.
At the summer hacker conferences, researchers have been talking up Windows 8 and its improved security. They talk a good game, but here’s the end run around it.
Antivirus vendor Kapersky has identified a new trojan horse targetting Macintoshes. It spreads a botnet based somewhere in China via an infected Microsoft Word document, typically sent as an e-mail attachment.
The spin is that if you don’t use Word on your Mac, you’re safe. That’s true–this week. But going forward, it’s going to take more than that.Read More »End of the innocence for Mac security