Monthly Archives: September 2012

Here’s another interesting description of social engineering. This time from an “ethical hacking” team. Note that they don’t have to find security holes in technology! How to rob a bank: a social engineering walkthrough.

Posted in Social Engineering | Tagged , , | Leave a comment

Kent Milligan from IBM recently sent a note out to ISVs and consultants regarding relatively recent security enhancements delivered via PTF. Here are some of the more interesting items copied from that letter.

Posted in IBM i Security | Tagged | Leave a comment

An interesting article appeared on the ARS Technica web site August 20, 2012. It argues — fairly persuasively — that passwords are even more susceptible today than they were just a few years ago. And it’s not just because of … Continue reading

Posted in Info Security Mgmt | Tagged , , , | Leave a comment