|
Crypto-Gram is a free monthly e-mail newsletter from security expert Bruce Schneier, with over 100,000 readers. In its seven years of regular publication, Crypto-Gram has become one of the most widely read forums for free-wheeling discussions, pointed critiques, and serious debate about security. As head curmudgeon at the table, Schneier explains, debunks, and draws lessons from security stories that make the news. |
Internet safety education. Founded in 1998 and endorsed by the
U.S. Congress
|
|
|||
|
Kaspersky Labs |
By Fyodo, who runs several Internet security resource sites, Insecure.Org, SecLists.Org, and SecTools.Org. He also wrote and maintains the Nmap Security Scanner. |
|
|||
|
The National Center for Missing
and Exploited Children, www.ncmec.org
|
Help Net Security |
|
|||
|
The Register's Security section |
securityfocus.com is a good first choice on what's going on with malware, etc. |
|
|||
Spyware Warrior |
Fighting spyware and adware. |
The University of Michigan's Information Technology Security Services website. |
The University of Michigan ITSS Security Services | |||
|
The Uribe 100 top 100 security site. |
The University of Michigan's Virus-Busters web site, virusbusters.itcs.umich.edu/. |
|
|||
|
viruslist.com
|
wiredsafety.org is the world's largest online safety and help group
|
|
|||
|
Security issues, tools, papers, advisories. |
Treachery.Net |
|
|||
philosecurity.org |
Philosecurity is written by Sherri Davidoff. Sherri Davidoff is an independent security consultant based in Missoula, MT. She specializes in penetration testing, forensics, vulnerability assessments and incident response. She holds a bachelor's degree in Computer Science and Electrical Engineering from MIT. When she's not busy with information security, Sherri pitches in with Buy It Like You Mean It, a Cambridge nonprofit dedicated to enabling socially responsible purchasing. |
The Kaspersky Lab Security News Service | ThreatPost.com |
RFID is a convenient way to tag items, products, people - and for hackers et. al. to game the system.
Collected information about SSL (Secure Socket Layer), TLS (Transport Layer Security), Certificates, Certicate Authorities (CAs), OpenSSL, OpenSSH, HTTPS, etc.
An attack on VOIP systems which can be done via. UDP.
This document is meant to provide web application developers, browser engineers, and information security researchers with a one-stop reference to key security properties of contemporary web browsers. Insufficient understanding of these often poorly-documented characteristics is a major contributing factor to the prevalence of several classes of security vulnerabilities.
Although all browsers implement roughly the same set of baseline features, there is relatively little standardization - or conformance to standards - when it comes to many of the less apparent implementation details. Furthermore, vendors routinely introduce proprietary tweaks or improvements that may interfere with existing features in non-obvious ways, and seldom provide a detailed discussion of potential problems.
See also the articles by Kurt Eichenwald of the New York Times.
A series of articles in the New York Times on child pornography, in particular the use of computers and credit card processors in the support of a large network of child pornographers and molesters.
Part 2 of a series of articles about Malware in 2005.
Part 1 of a series of articles about Malware in 2005.
Lessons from the Beagle Virus
Lessons from the Beagle Virus
Security Focus March 12, 2007 by Mark Rasch.
SecurityFocus Apr 23 2007 12:00AM
IPv6 Protocol Type 0
Route Header Denial of Service Vulnerability
See also:
Vulnerability Assessment Team (VAT)
Seals
Physical Security Maxims
(local PDF copy)
Yellow Dots of Mystery: Is Your Printer Spying on You?
See also: