LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
Members of secretive group indicted in piracy plot
03 February 2006
A group of cyber-pirates stole copyrighted software, games and movies in what law enforcement author
Government
1 - 2 min read
Make Backups Of Pr0n, Go To Prison!
02 February 2006
If you've ever had the displeasure of investigating the possible downloading of child pornography by
General Security
1 - 2 min read
Cellcos and senate vs social engineering
02 February 2006
New legislation proposed by Senator Chuck Schumer (D, NY) and backed by heavyweights from both major
Government
1 - 2 min read
Feature: The Top 10 Infosec Myths
01 February 2006
Merriam-Webster defines a myth as a popular belief or tradition that has grown up around something o
General Security
1 - 2 min read
SOX Compliance Is Worth the Effort
01 February 2006
SOX compliance has helped to make ethics training more common within the corporate environment. Acco
General Security
1 - 2 min read
Shmoocon 2006: Wi-Fi Trickery or How to Secure, Break and Have Fun with Wi-Fi
01 February 2006
Franck Veysset and Laurent Butti, both from France Telecom R&D, presented several proof-of-concept t
Wireless Security
1 - 2 min read
UK To Strengthen Cybercrime Laws
31 January 2006
One of the biggest problems with cybercrime in the UK remains the law. Back in 1990, the government
General Security
1 - 2 min read
Instant messaging targeted for malicious worm attack
31 January 2006
Businesses have been warned to prepare themselves for an onslaught of malicious worm attacks throug
General Security
1 - 2 min read
Dial 'D' for DoS; VoIP's hidden security threat
31 January 2006
Communication technology experts have released a report highlighting inherent security issues with V
Network Security
1 - 2 min read
OSS is an easier hack: Mitnick
31 January 2006
In an exclusive interview on Friday, infamous hacker Kevin Mitnick told Tectonic that, given the cho
Forums
1 - 2 min read
Cross Site Cooking
31 January 2006
There are three fairly interesting flaws in how HTTP cookies were designed and later implemented in
Host Security
1 - 2 min read
Ten Threats You Probably Didn't Make Plans For
30 January 2006
As an IT Manager or perhaps a more specialised IT Security Officer, you have your security policy in
General Security