Video Screencast Help

Encryption Blog

Results for Encryption Blog

An interesting local story appeared in today's San José Mercury News. An ISP that was working under the brand McColo was shutdown when its two "upstream providers" Hurricane Electric and Global Crossing unplugged their links to McColo. ...
Blog Entry by Doug McLean | 13 Nov 2008 | 0 comments
The Supreme Court announced today that they would hear the first case on identity theft to reach the high court. When I first saw the headline I thought great, now maybe we'll get some focus on this issue. Unfortunately, the case itself is only ...
Blog Entry by Doug McLean | 20 Oct 2008 | 0 comments
As a lifelong resident of California I’d be the first to admit that state politics on the left coast can sometimes be a little peculiar. Last month with the Governor and the Legislature at their traditional impasse over the state budget, the ...
Blog Entry by Doug McLean | 04 Oct 2008 | 0 comments
Congress Passes Cybercrime Bill While the executive branch of the U.S. government was consumed last week with helping the credit markets find a way out the desert, the legislative branch focused just long enough on cybercrime to pass an important bill. ...
Blog Entry by Doug McLean | 23 Sep 2008 | 0 comments
The U.S. Department of Justice yesterday released the results of a cybercrime survey in which they polled nearly 8,000 businesses about their experience with cybercrime. Not surprisingly, they found that 67% of their respondents had detected at ...
Blog Entry by Doug McLean | 18 Sep 2008 | 0 comments
Damon Patrick Toey plead guilty Friday to his role in the TJX breach. The legal strategy being pursued by the prosecution here is pretty clear. Get one or more of the minor players to roll over by promising leniency if they testify against the ...
Blog Entry by Doug McLean | 15 Sep 2008 | 0 comments
A report out of the Identity Theft Resource Center claims that the number of data breaches in 2008 has already surpassed 2007's total of 446. While it's intuitively obvious that the number of data breaches is increasing, I have a hard time ...
Blog Entry by Doug McLean | 03 Sep 2008 | 0 comments
Jesper Johansson posted a really terrific piece entitled " Anatomy of a Malware Scam " on The Register Friday. Johansson is an All-Pro security expert and researcher and does a marvelous job of breaking down an extremely complicated scam into ...
Blog Entry by Doug McLean | 24 Aug 2008 | 0 comments
OK, it may not be as big a news story as Lindsay Lohan's announcing she's converting to Judaism, but I thought the story coming out of embattled Georgia that they have been seeing massive Distributed Denial of Service attacks originating in ...
Blog Entry by Doug McLean | 15 Aug 2008 | 0 comments
It's been said that you shouldn't ever overestimate the intelligence of your basic criminal. One of my favorite cybercrime stories, however, deals with a perpetrator who was clearly smart enough, but was just unlucky...very unlucky. In June ...
Blog Entry by Doug McLean | 14 Aug 2008 | 0 comments