Welcome!

Information Security and Network Awareness

Hurricane Labs

Subscribe to Hurricane Labs: eMailAlertsEmail Alerts
Get Hurricane Labs via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Hurricane Labs

Ohio LinuxFest 2012 – Reflecting on Fun By: Dru Streicher Another Ohio LinuxFest has come and gone, yet the level of ingenuity I witness every year never ceases to amaze me. There were two presentations that stood out as the highlights of my weekend. The first presenter, Daniel Thau, demonstrated his new distribution called Bedrock Linux. I’ll admit it, the cynic in me was saying, “great just what we need, another distro.” I thought of all the distributions flying around today and wondered what could be so special about this one. Boy was I wrong! Bedrock Linux is unique: it pulls several distributions together and runs them all simultaneously – all controlled by a single kernel. In the demo he presented, Thau showed that he was using X from Arch, Compiz from Debian, and a window manager from another distro on top of that! Bedrock Linux does all this by a combinatio... (more)

Review of Certificate of Cloud Security Knowledge

By Bill Mathews Recently (well, last night) I had the opportunity to take the Certificate of Cloud Security Knowledge exam and just wanted to put out some of my thoughts while they were fresh in my head. I always like to take a random sampling of certifications. It’s fun to challenge myself (some are more challenging than others) and it gives me a good idea of what sorts of training and certificates I’d like my guys to have (if any). I’ve never been the biggest fan of some of the bigger ones out there, but we’ll save that for another post. The bulk of the CCSK covers the Cloud ... (more)

No Firewall, No Problem?

No Firewall, No Problem? By: Matt Yonchak In one of the more short-sighted, narrow-minded, and just downright inane articles that I’ve read in quite sometime Roger Grimes told us all about “Why you don’t need a firewall.“ His premise is that exploits and attacks are developing at a level as to surpass the capabilities of a conventional firewall and that firewalls aren’t used properly so why bother. We’ve all heard that before and I won’t even get into the muddled waters of the next-generation firewall concept, though I could. The worse part about the idea of the firewall being ... (more)

Mobile Security Apps – ESET

By: Bill Mathews - Anyone who listens to our podcast should know that I hate all anti-virus and anti-virus vendors. I really don’t have too many shades of grey when it comes to it, so it’s pretty hard to make me want to do anything regarding anti-virus technology that isn’t just recommending you get rid of the platform that is so susceptible to it. I’ve argued (and still argue) that even though there is clearly a malware issue with Android phones (unless lots of folks are lying), it is not as bad as the vendors make it out to be. They have a whole new platform to infect…err, get ... (more)

Take Social Media Privacy Into Your Own Hands

By Steve McMaster - I’ve gotten in a lot of arguments lately about one of the latest “hot topics” in the end-user side of technology – privacy. With some of the biggest names in Social Media doing a really bad job of it (and I’m not even just talking about leaked passwords), it’s something that’s throwing itself in the face of many average, day-to-day computer users. Many in the security industry already know most of the things people are discovering, and have screamed warnings from the mountaintops to the folks below. Alas, this is the woe of being a security engineer. But here’... (more)