Cool Tool: Why You Need Kon-Boot

This is one CD you'll be carrying in your toolkit from here on in...

It's just another way to get full privileges once you have physical access, but it looks nice and simple and even supports Windows 7 for Chrissakes!

Pirate Bay Prosecution a Waste of Police Resources

The prosecution of The Pirate Bay Four in criminal courts was a waste of police resources, argues Nigel Phair.

Handing down a year in the big house is a strong deterrent against those who may consider doing this type of thing in the future, but is it really the best judicial outcome?

Essential reading: Verizon's Data Breach Study

Breaches, dataloss up in 2008, report claims...

The report is essential reading; the post-mortem analysis of data breaches is to the information security industry what black-box flight recorder information is to the aviation industry. By understanding where things have gone wrong, we can avoid repeating the mistakes of some of our peers.

Poor Scoping Disastrous for Security

The limited scope afforded to your security staff and contractors could harm your business, writes Metlstorm...

All enterprises must eventually accept that security is just one more part of software or system development lifecycle. Both designs and implementations must be reviewed, developers need security training and infosec teams need the power to veto go-live dates.

Log Retention Unworkable in Wireless World

New rules to force log retention have unexpected effects, writes Nigel Phair...

Under this Act, lawmakers are seeking to impose requirements on ISPs and wireless network operators to keep records about the identities of their users.

Debian spawns BSD lovechild

User of Debian Linux will soon have a choice of kernels...

The move seems to be an attempt to offer the BSD kernel within the Debian Linux userland environment. Users who install Debian's FreeBSD kernel will be able to use the BSD packet filter, pf, as well as other BSD-specific security features like jails.

I Heart... Windows?!

Metlstorm justifies his forbidden love for Windows...

"They're making us roll out Active Directory," he whined, looking for sympathy from a fellow UNIXnerd. But the sad, awful truth is this: Windows infrastructure is actually usable -- and perhaps even securable -- in the enterprise.

Fear Thy Name is Conficker

If you're looking for someone to blame for the virus on your computer, try your bank...

Over the last few weeks you may have read reports of a computer virus named Conficker. It's sophisticated and has infected millions of systems.

Quality, Opacity, and the Wiseass Business Model

Metlstorm gets heckled by CIOs over breakfast...

Normally at these sorts of events protocol dictates that I have a sales department chaperone present at all times to make sure I use the correct fork for the shrimp cocktail, etc, and this was no exception.

Router Botnet Uncovered

New botnet made up of consumer-grade routers uncovered, researchers say...

The group claims the botnet has been targeting DroneBL's servers in a denial-of-service campaign for several weeks and is the first of its kind. It uses brute-force password cracking attempts to hijack any Linux mipsel routing device that uses insecure or common username and password pairs.


SUBSCRIBE NOW:
Risky Business main podcast feed:
Listen on Apple Podcasts Listen on Overcast Listen on Pocket Casts Listen on Spotify Subscribe with RSS
Our extra podcasts feed:
Listen on Apple Podcasts Listen on Overcast Listen on Pocket Casts Listen on Spotify Subscribe with RSS
Subscribe to our newsletters: