This is Adam Shostack’s threat modeling blog series, as a single document.
How to combat tech support phone scams
Nana writes: “I received a telephone call at home from a person claiming to be … Read more »
What’s new in Windows 8
Windows 8 is now available to buy at the Microsoft Store and other retailers. You … Read more »
SQL Injection Defense Tools
A couple of weeks ago, I posted a blog entry with links to SQL injection … Read more »