Video: Recent advances in IPv6 security

There are a number of factors that make the IPv6 protocol suite interesting from a security standpoint. Firstly, being a new technology, technical personnel has much less confidence with the IPv6 protocols than with their IPv4 counterpart
Chinese hackers miss Google network, but the checks go on

Eric Schmidt, Google’s executive chairman, put a question to an audience Gartner’s Symposium ITxpo here on Monday. “Raise [your] hand if you’re sure the Chinese are not inside your corporate network.”
Dell shipping new all-flash storage option for data-intensive apps

Once again shifting the spotlight away from PCs (and all that private business news), Dell is touting its enterprise storage portfolio — specifically a new set of all-flash storage solutions for big data-hungry applications.
A BalCCon postscript: Armed and dangerous in the Balkans, and DEF CON Returns

In September, Serbia’s city of Novi Sad hosted the first-ever official hacker conference in the Balkans, BalCCon: First Congress (First Contact).
Google takes down more than eight ‘pirate’ links every second

Google took down a record-breaking 5.3 million allegedly infringing links from its search engine in the last week of September, equivalent to just under nine links every second.
Living in Glass Houses – #InfoSec Industry’s Culture of Shaming

If you’re anything like me and like to keep up on the industry, you’ve no doubt been overloaded with news on the apparently epic Adobe hack. As some of you may no doubt point out I’m no apologist for companies who fail to take security seriously
Report: NSA has little success cracking Tor

The U.S. National Security Agency has repeatedly tried to compromise Tor, the government-funded online anonymity tool, but has had little success, according to a new report in the U.K.’s Guardian.
Does your phone need a phone of its own?

Phablets are fabulous. But they’re awfully large objects to be constantly pulling out of purses, backpacks and pockets. As we embrace giant smartphones for their big, beautiful screens
Firms, Researchers Seek Better Ways To Detect Evasive Threats

When companies relied on the static analysis of binaries to determine whether a program is malicious, attackers came up with a simple way to bypass defenses: obfuscating the code with packers and other techniques.
Rose Tinted Security: Beware Users

We all had a lot of fun making the trilogy of “Meet John Powers” videos earlier this summer, as did the cast and crew from Twist & Shout who produced the series.