Passwords, PINs, Needles and Haystacks
An interesting conference on passwords, but why so sloppy about deadline date formatting? The post Passwords, PINs, Needles and Haystacks appeared first on ITsecurity.
View ArticleSignatures newsflash: AV doesn’t detect what it doesn’t detect
Signatures aren't The Answer, but they're not always ineffective. The post Signatures newsflash: AV doesn’t detect what it doesn’t detect appeared first on ITsecurity.
View ArticleBehavioural Profiling: Conforming to Type
http://itsecurity.co.uk/2015/04/top-facebook-stories-your-choice/ The post Behavioural Profiling: Conforming to Type appeared first on ITsecurity.
View ArticleLies, damned lies and statistics*
Security, surveys and the Silly Season The post Lies, damned lies and statistics* appeared first on ITsecurity.
View ArticleSysadmin Day: have you tried rebooting
Sysadmin Day: appreciating the unsung heroes of IT support. The post Sysadmin Day: have you tried rebooting appeared first on ITsecurity.
View ArticleDouble Dipping: Nuclear exploit, fake BSOD, support scams
Support scam articles are like buses: there’s nothing happening for months, then there are half a dozen at once. I’ve already mentioned in several places a burst of issues relating to support scams,...
View ArticleSpy Versus Spy: Campbell, Snowden and ECHELON
My eye was caught by Duncan Campbell's article for The Register and Intercept on the origins of automated surveillance - partly because I didn't think there was any doubt about the existence of...
View ArticleComment spam: what would Letitia say?
Would it ease the strain on my mailbox if I point out that it’s very unlikely that I will ever approve a comment on any of my articles anywhere promoting football jerseys, escort services, or...
View ArticleInformation, News and Education
Where all content on a security site is seen as assumed to be at the same level of expertise, a number of things can go wrong. The post Information, News and Education appeared first on ITsecurity.
View ArticleSpam: Casablanca Revisited
20th century film star reincarnated as spam star. The post Spam: Casablanca Revisited appeared first on ITsecurity.
View ArticleWatching the Furby Fly
Somehow, the Furby, a furry toy vaguely resembling a Mogwai (the cuddly pre-Gremlin version in Joe Dante’s films, rather than the demons of Chinese tradition1) has always invited a certain amount of...
View ArticleThe 419: Mugs and Mugus
I was delighted to receive the following invitation recently from someone calling himself Heinz: … I have an offer worth 23million if interested, please contact me I wonder what it’s worth if I’m not...
View ArticleDennis Technology’s 2015 testing report
An interesting report on product testing from one of the better anti-malware testers. The post Dennis Technology’s 2015 testing report appeared first on ITsecurity.
View ArticleIoT Hacking: Surviving an Online World
Today has been a good day for panic (for tomorrow we die). Plane hacking, sea port hacking, even EEG hacking. Let's go down singing. The post IoT Hacking: Surviving an Online World appeared first on...
View ArticleiOS and Malware
iOS, AV, and why I don't (usually) make product recommendations. The post iOS and Malware appeared first on ITsecurity.
View ArticleMusic, Security, and a Nice Cup of Tea
Music as a tool for improving security? No wonder the security industry has made all those YouTube videos. The post Music, Security, and a Nice Cup of Tea appeared first on ITsecurity.
View ArticleSupport Scams: Splashes in the Phish Pool
Dan Goodin wrote yesterday for Ars Technica that Support scams that plagued Windows users for years now target Mac customers, complete with a Malwarebytes screenshot of a fake Safari alert. In fact,...
View ArticleCyberjargon and 100% Security
Further to the post Music, Security, and a Nice Cup of Tea, I just came across this very-much-to-the-point post by Kurt Wismer, specially for those of us who are thoroughly annoyed by the addition of...
View ArticleSafe Harbor, Pearl Harbor
The bombing of Safe Harbor: the view from Microsoft The post Safe Harbor, Pearl Harbor appeared first on ITsecurity.
View ArticleBackdoor Barbie: Let’s Go Party
Is your home still your castle, or are there Barbie-arians at the gates? The post Backdoor Barbie: Let’s Go Party appeared first on ITsecurity.
View Article
More Pages to Explore .....