Quantcast
Channel: Humour – The InfoSec Blog
Browsing latest articles
Browse All 16 View Live

Engineering Definitions

With Thanks to Gary Hinson and Michael Gerdes who found this on the web and extended it … Project Manager is a Person who...

View Article



Dangerous … Nothing

Scott Adams, the creator of the Dilbert cartoon, recounts in his blog his recent experiences with airport security and its oddities in “Dangerous Containers“....

View Article

Trojan horse Penetration Testing

I’m no fan of Pen-testing, but its remarkable how people fail to learn from the past experience of others, even when that experience is...

View Article

Visio in Ascii

http://search.cpan.org/dist/App-Asciio/lib/App/Asciio.pm This gtk2-perl application allows you to draw ASCII diagrams in a modern (but simple) graphical application. The ASCII graphs can be saved as...

View Article

Best spam *ever* …

Maybe I’m just punchy from dealing with too much real spam, but I found this hilarious. Introducing–Penis Reduction Pills! Shipped to you, not in...

View Article


New Words

A non-native English speaker I was in correspondence with thanked me for helping expand his vocabulary. It occurs to me that understanding English grammar...

View Article

Yes! It’s the cardboard PC!

I would hate to have to do a risk analysis on the use of these! Oh, and then there’s Bamboo! http://www.reghardware.co.uk/2008/12/02/asus_bamboo_laptop/ What’s next? Soy?...

View Article

OWASP Top Ten is really the OWASP Top 6.5

Image via Wikipedia http://secureme.blogspot.com/2005/10/owasp-top-ten-is-really-owasp-top-65.html This is somewhat dated, but so what? Most of the points raised still hold valid. It opens: CIO/CSO: “I...

View Article


8 Dirty Secrets of the IT Security Industry – CSO.com

Bill Brenner  wrote an article that covers some security consulting in general and PCI DSS in particular. Do make note of points 1,3, and...

View Article


The Glass Half Full

Image by Getty Images via @daylife Optimist: The glass is half full Pessimist: The glass is half empty Cost Accountant: The vessel is too...

View Article

The FBI risk equation

It seems that to make better cybersecurity-related decisions a senior FBI official recommends considering a simple algebraic equation: risk = threat x vulnerability x...

View Article

His Bipolar made him do it

http://compliancesearch.com/compliancex/current-affairs/his-bipolar-made-him-do-it/ An accused hedge fund fraudster’s mother is showing support, by claiming her son is not to blame for defrauding...

View Article

TV kills!

I keep telling everybody that TV is injurious to your (mental) health, but does anyone listen? Why should they? They didn’t when Gerry Mander...

View Article


Identity Management in the extreme!

http://www.abcactionnews.com/dpp/news/region_pasco/fantasy-or-criminal-mind-police-find-stash-of-fake-ids-and-uniforms Investigators say Antigua tried to pass himself off as an Air Force veteran, a...

View Article

“Paid to be paranoid”

Read the first four paragraphs of this: http://hollylisle.com/shoes-and-handbags/ Forget the rest, forget that its about ‘creative writing’, just answer that question. Bruce Schneier among...

View Article


Another reason to have a policy not to eat at your desk

Hackers Can Use Pita Bread to Steal Laptop Encryption Keys, Say Researchers Embedding such devices in something edible only means it will end up...

View Article
Browsing latest articles
Browse All 16 View Live




Latest Images