- Fuzzing at the scale of Google, Google Online Security Blog
- New, undeletable cookie, Schneier on Security
- Legal fight over “eternal” cookies, The H Security
- WPA/WPA2 brute force cracking with CPUs, GPUs and the cloud, tom’s hardware via Slashdot
- How the Google-Motorola deal may affect security, threatpost
- Using mobile VPNs to stay secure on the go, The H Security
- Kaspersky study finds Adobe software is biggest security risk, The H Security
- Adobe admits to 80 ‘code changes’ in Flash Player patch, Zero Day at ZDNet
- Adobe explaines Flash Player hole count differences, The H Security
- Can we fix SSL certification?, Slashdot
- Malware steals bitcoins using victims own GPU, The Register
- Study finds IE9 best at block malware, Slashdot
- Firefox 6 patches 10 dangerous security holes, Zero Day at ZDNet
- Firefox, Thunderbird and Seamonkey updates address critical errors, The H Security
- Rails gets updates for critical issues in all versions, The H Security
- Beware of juice jacking, Krebs on Security
- First dent in the AES crypto algorithm, The H Security
- PHP 5.3.7 update closes security holes, The H Security
- Google highlights trouble in detecting malware, Slashdot
- Microsoft drops use of “supercookies” on MSN, threatpost
- Acceleromater used to log smartphone keystrokes, The H Security
- Insulin pump attack prompts call for federal probe, The Register
Ogg Vorbis is a totally open format.
There are many ways you can support the blog and the podcast.
All media available for download on this site is DRM-free. Label courtesy of the FSF's Defective By Design campaign, under a CC-BY-SA Unported 3.0 license.
The views and opinions expressed on this site and in the podcast are my own and don't necessarily reflect those of my employer or anyone else.