Tag Archives | Information Security

‘Bad Neighborhoods’ On the Internet Are a Real Nuisance

Of the 42,000 Internet Service Providers (ISPs) surveyed, just 20 were found to be responsible for nearly half of all the internet addresses that send spam. That just is one of the striking results of an extensive study by the University of Twente’s Centre for Telematics and Information Technology (CTIT). This study focused on “Bad [...]

Read full story Comments { 0 }
Security Protocol for Online Banking and Facebook Has ‘serious Weaknesses,’ Say Researchers

Security Protocol for Online Banking and Facebook Has ‘serious Weaknesses,’ Say Researchers

The protocol that provides security for online banking, credit card data and Facebook has major weaknesses, according to researchers at Royal Holloway University. The Transport Layer Security (TLS) protocol is used by millions of people on a daily basis. It provides security for online banking, as well as for credit card data when shopping on [...]

Read full story Comments { 0 }
Researchers Work to Counter Spear Phishing Attacks

Researchers Work to Counter Spear Phishing Attacks

The email resembled the organization’s own employee e-newsletter and asked recipients to visit a website to confirm that they wanted to continue receiving the newsletter. Another email carried an attachment it said contained the marketing plan the recipient had requested at a recent conference. A third email bearing a colleague’s name suggested a useful website [...]

Read full story Comments { 0 }
Cell Phone Financial Identity Theft

Cell Phone Financial Identity Theft

While the cell phone is an amazingly useful device, using it for banking — and consumers are increasingly using mobile phones as banking tools — can lead to identity theft and other financial crimes, if reasonable precautions aren’t taken. “Anyone who has access to your cell phone has access to your identity in a few [...]

Read full story Comments { 0 }
‘Control-Alt-Hack’ Game Lets Players Try Their Hand at Computer Security

‘Control-Alt-Hack’ Game Lets Players Try Their Hand at Computer Security

Do you have what it takes to be an ethical hacker? Can you step into the shoes of a professional paid to outsmart supposedly locked-down systems? Players assume the roles of characters with their own special skills. Game play involves completing missions by rolling the dice, using skills and occasionally pulling something out of a [...]

Read full story Comments { 0 }
Reflections On HP In 2012:  “Learning From Contrast” by Oliver Rochford

Reflections On HP In 2012: “Learning From Contrast” by Oliver Rochford

Oliver Rochford is a Senior Security Consultant and Security Architect at HP Enterprise Security Services in Germany. He is an an expert in Vulnerability Assessment, Vulnerability and Threat Management, Cybercrime and Information Security. Here Oliver is our guest blogger and has provided some insight into his new role at HP and how he views the [...]

Read full story Comments { 0 }
What is Your Digital Grid?

What is Your Digital Grid?

As consumers of digital technology do you not get the sense that the pace of change is increasing and impacting us with little time to sit back, watch, take things in, and try to make sense of it all.  Nowadays digital devices and digital environments tend to suddenly show up almost invisible to our awareness [...]

Read full story Comments { 0 }
No Privacy, please!

No Privacy, please!

We are in a world were our communication, information , search, entertainment, creation, and content are done with some form of digital device with access to the internet. This dynamic intricately tied to our personal and professional lives : privacy both online and offline is being transformed.  Some of this is within our control and [...]

Read full story Comments { 0 }
Assessing Pentagon Performance On Information Security From some Ex-Hacker’s POV

Assessing Pentagon Performance On Information Security From some Ex-Hacker’s POV

Ever since there’s been data storage devices, there’s been guys trying to plant pieces of code on them to steal data or wreak havoc. Twenty-five or more years ago, we were constantly losing data because of worms, viruses and crooks and faulty or stolen floppy disks. Recently we’ve seen how SecureID’s used extensively for on [...]

Read full story Comments { 0 }

The Biggest Shortcomings of ISO 27001

If you’ve been reading my blog, you probably think I’m convinced ISO 27001 is the most perfect document ever written. Actually, that’s not true – working with my clients and teaching on the subject, usually the same weaknesses of this standard emerge. Here they are, together with my suggestions how to resolve them: Ambiguous Terms [...]

Read full story Comments { 0 }