Quantcast
Channel: David Harley – ITsecurity
Browsing all 141 articles
Browse latest View live

Passwords, PINs, Needles and Haystacks

An interesting conference on passwords, but why so sloppy about deadline date formatting? The post Passwords, PINs, Needles and Haystacks appeared first on ITsecurity.

View Article



Signatures newsflash: AV doesn’t detect what it doesn’t detect

Signatures aren't The Answer, but they're not always ineffective. The post Signatures newsflash: AV doesn’t detect what it doesn’t detect appeared first on ITsecurity.

View Article

Behavioural Profiling: Conforming to Type

http://itsecurity.co.uk/2015/04/top-facebook-stories-your-choice/ The post Behavioural Profiling: Conforming to Type appeared first on ITsecurity.

View Article

Lies, damned lies and statistics*

Security, surveys and the Silly Season The post Lies, damned lies and statistics* appeared first on ITsecurity.

View Article

Sysadmin Day: have you tried rebooting

Sysadmin Day: appreciating the unsung heroes of IT support. The post Sysadmin Day: have you tried rebooting appeared first on ITsecurity.

View Article


Double Dipping: Nuclear exploit, fake BSOD, support scams

Support scam articles are like buses: there’s nothing happening for months, then there are half a dozen at once. I’ve already mentioned in several places a burst of issues relating to support scams,...

View Article

Spy Versus Spy: Campbell, Snowden and ECHELON

My eye was caught by Duncan Campbell's article for The Register and Intercept on the origins of automated surveillance - partly because I didn't think there was any doubt about the existence of...

View Article

Comment spam: what would Letitia say?

Would it ease the strain on my mailbox if I point out that it’s very unlikely that I will ever approve a comment on any of my articles anywhere promoting football jerseys, escort services, or...

View Article


Information, News and Education

Where all content on a security site is seen as assumed to be at the same level of expertise, a number of things can go wrong. The post Information, News and Education appeared first on ITsecurity.

View Article


Spam: Casablanca Revisited

20th century film star reincarnated as spam star. The post Spam: Casablanca Revisited appeared first on ITsecurity.

View Article

Watching the Furby Fly

Somehow, the Furby, a furry toy vaguely resembling a Mogwai (the cuddly pre-Gremlin version in Joe Dante’s films, rather than the demons of Chinese tradition1) has always invited a certain amount of...

View Article

The 419: Mugs and Mugus

I was delighted to receive the following invitation recently from someone calling himself Heinz: … I have an offer worth 23million if interested, please contact me I wonder what it’s worth if I’m not...

View Article

Dennis Technology’s 2015 testing report

An interesting report on product testing from one of the better anti-malware testers. The post Dennis Technology’s 2015 testing report appeared first on ITsecurity.

View Article


IoT Hacking: Surviving an Online World

Today has been a good day for panic (for tomorrow we die). Plane hacking, sea port hacking, even EEG hacking. Let's go down singing. The post IoT Hacking: Surviving an Online World appeared first on...

View Article

iOS and Malware

iOS, AV, and why I don't (usually) make product recommendations. The post iOS and Malware appeared first on ITsecurity.

View Article


Music, Security, and a Nice Cup of Tea

Music as a tool for improving security? No wonder the security industry has made all those YouTube videos. The post Music, Security, and a Nice Cup of Tea appeared first on ITsecurity.

View Article

Support Scams: Splashes in the Phish Pool

Dan Goodin wrote yesterday for Ars Technica that Support scams that plagued Windows users for years now target Mac customers, complete with a Malwarebytes screenshot of a fake Safari alert. In fact,...

View Article


Cyberjargon and 100% Security

Further to the post Music, Security, and a Nice Cup of Tea, I just came across this very-much-to-the-point post by Kurt Wismer, specially for those of us who are thoroughly annoyed by the addition of...

View Article

Safe Harbor, Pearl Harbor

The bombing of Safe Harbor: the view from Microsoft The post Safe Harbor, Pearl Harbor appeared first on ITsecurity.

View Article

Backdoor Barbie: Let’s Go Party

Is your home still your castle, or are there Barbie-arians at the gates? The post Backdoor Barbie: Let’s Go Party appeared first on ITsecurity.

View Article
Browsing all 141 articles
Browse latest View live




Latest Images