I’m in Taipei since Saturday noon. I attended Trend Micro’s PaJaMa 2009 conference held at the Sunworld Dynasty Hotel Taipei. PaJaMa 2009 – The Smart Protection Network Conference’s tagline was “Be the light that brings the rainbow” and I am sharing some of my personal insights and experience here in my blog. What is PaJaMa […]
In the RSA 2009 Conference that I attended early this year, I participated in an exercise called Six Word Memoirs. In this exercise the organizers invited the attendees to tell the story of their life with one big catch – do it in only six words. This is quite a challenge, I know most of […]
Note: The article below was published in Computerworld Philippines July 2009 issue (print edition, Web Security Lifeline, page 55). I got permission from ComputerworldPH to republish it in my personal blog recently. Effective Security Practices in the Workplace: Keeping Your Business Safe By Menard Oseña When it comes to information security, the human element is […]
I was browsing the web and noted that a lot of blogs and news sites have posting on the iphone virus and iphone hacking topic. I was intrigued so I did some researching and some connecting of the dots: this week is Black Hat Security Conference week and somebody must have demo’d some iphone hacking […]
In my post on MyBrute Cheats, I mentioned that bad guys may abuse the popularity of the Mybrute game. I’m predicting that some bad guys will use the popularity of MyBrute. This is Social Engineering 101… I totally missed to point out that same possibility on the Katrina Halili scandal download post that I made […]
URL shortening services are very useful and is great especially for those social networking sites (facebook, twitter, etc.). I have nothing against the use of TinyURL, bit.ly, is.gd, ping.fm and other URL shortening services. I am sharing the information that sometimes useful things are being abused by the bad guys. These bad guys can create […]
This is a long delayed post. Was really busy with some office stuffs when I arrived to Cupertino office. So the highlights: Day 3 Ira Winkler’s Is Google Evil? preso is a good one. He discusses some good points on potential Google apps with controversial policies. (From CNET/Schmidt, Google Streetview, UK protests, Japan Legal issues, […]
Some of my favorite topics for the RSA 2009 Day 2: On the keynotes side: I like the Moving Towards ‘End to End Trust’: A Collaborative Effort from MS’s Scott Charney. It shows the effort and commitment of MS on building the trust from end to end perspective. On the afternoon sessions its worth mentioning […]
First things first, what is RSA 2009 Conference? It is the biggest Information Security Industry Conference and Exposition. I promised in my last post that I will update this blog with my San Francisco and RSA adventures so here we go… Monday, April 20, 2009 is Day 1 for the RSA 2009 conference in San […]
A follow-up post on my Downad Conficker April 1 article series. The D-Day has passed and it is good to hear that there were no major devastating issues related to Downad. But as Mad-Eye Moody of the Harry Potter series would say “Constant Vigilance!“. Nuff said 🙂 Below is an interesting article from ZDNET blogs. […]