Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Interesting piece in today's Wall Street Journal about President-Elect Obama's decision to appoint a cabinet level cybersecurity chief. The role as described will be one of those cross agency coordination jobs that has almost no staff or ...
Blog Entry by Doug McLean | 08 Dec 2008 | 0 comments
I've believed this for some time, but the author of this post does an unusually good job of describing how cybercrime gangs are now organized. I also really like the parallel's Michael draws between cybercrime gangs and their Mafia ...
Blog Entry by Doug McLean | 01 Dec 2008 | 0 comments
An interesting local story appeared in today's San José Mercury News. An ISP that was working under the brand McColo was shutdown when its two "upstream providers" Hurricane Electric and Global Crossing unplugged their links to McColo. ...
Blog Entry by Doug McLean | 13 Nov 2008 | 0 comments
The Supreme Court announced today that they would hear the first case on identity theft to reach the high court. When I first saw the headline I thought great, now maybe we'll get some focus on this issue. Unfortunately, the case itself is only ...
Blog Entry by Doug McLean | 20 Oct 2008 | 0 comments
As a lifelong resident of California I’d be the first to admit that state politics on the left coast can sometimes be a little peculiar. Last month with the Governor and the Legislature at their traditional impasse over the state budget, the ...
Blog Entry by Doug McLean | 04 Oct 2008 | 0 comments
Congress Passes Cybercrime Bill While the executive branch of the U.S. government was consumed last week with helping the credit markets find a way out the desert, the legislative branch focused just long enough on cybercrime to pass an important bill. ...
Blog Entry by Doug McLean | 23 Sep 2008 | 0 comments
The U.S. Department of Justice yesterday released the results of a cybercrime survey in which they polled nearly 8,000 businesses about their experience with cybercrime. Not surprisingly, they found that 67% of their respondents had detected at ...
Blog Entry by Doug McLean | 18 Sep 2008 | 0 comments
Damon Patrick Toey plead guilty Friday to his role in the TJX breach. The legal strategy being pursued by the prosecution here is pretty clear. Get one or more of the minor players to roll over by promising leniency if they testify against the ...
Blog Entry by Doug McLean | 15 Sep 2008 | 0 comments
A report out of the Identity Theft Resource Center claims that the number of data breaches in 2008 has already surpassed 2007's total of 446. While it's intuitively obvious that the number of data breaches is increasing, I have a hard time ...
Blog Entry by Doug McLean | 03 Sep 2008 | 0 comments
Jesper Johansson posted a really terrific piece entitled " Anatomy of a Malware Scam " on The Register Friday. Johansson is an All-Pro security expert and researcher and does a marvelous job of breaking down an extremely complicated scam into ...
Blog Entry by Doug McLean | 24 Aug 2008 | 0 comments